New Algorithms for Secure Outsourcing of Modular Exponentiations
Tóm tắt
Từ khóa
Tài liệu tham khảo
krawczyk, 2000, Chameleon Hashing and Signatures, Proc NDSS, 143
golle, 2001, Uncheatable Distributed Computations, Proc CT-RSA, lncs 2020, 425
girault, 2005, Server-Aided Verification: Theory and Practice, Proc ASIACRYPT, lncs 3788, 605
kilian, 1995, Improved Efficient Arguments (Preliminary Version), Proc Crypto, 311
kilian, 1992, A Note on Efficient Zero-Knowledge Proofs and Arguments, Proc ACM Symp Theory Comput, 723
hohenberger, 2005, How to Securely Outsource Cryptographic Computations, Proc TCC, lncs 3378, 264
garay, 2003, Strengthening Zero-Knowledge Protocols using Signatures, Proc EUROCRYPT, lncs 2656, 177
green, 2011, Outsourcing the Decryption of ABE Ciphertexts, Proc 20th USENIX Conf Secur
0
gennaro, 2010, Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, Proc Crypto, lncs 6223, 465
atallah, 2010, Securely Outsourcing Linear Algebra Computations, Proc 5th ACM Symp Inf Comput Commun Secur, 48
carbunar, 2008, Conditioal Payments for Computing Markets, Proc CANS, lncs 5339, 317
chen, 2004, Chameleon Hashing without Key Exposure, Proc ISCAS, lncs 3225, 87
chevallier-mames, 2010, Secure Delegation of Elliptic-Curve Pairing, Proc CARDIS, lncs 6035, 24
chen, 2012, New Algorithms for Secure Outsourcing of Modular Exponentiations, Proc ESORICS, lncs 7459, 541
wu, 2008, Server-Aided Verification Signatures: Definitions and New Constructions, Proc ProvSec, lncs 5324, 141
benabbas, 2011, Verifiable Delegation of Computation Over Large Datasets, Proc Crypto, lncs 6841, 111
blanton, 2012, Secure and Efficient Outsourcing of Sequence Comparisons, Proc ESORICS, lncs 7459, 505
blum, 1991, Program Result Checking Against Adaptive Programs and in Cryptographic Settings, Proc DIMACS Series Discrete Math Theoretical Comput Sci, 107
boyko, 1998, Speeding Up Discrete Log and Factoring Based Schemes via Precomputations, Proc EUROCRYPT, lncs 1403, 221
chaum, 1989, Undeniable Signatures, Proc Crypto, lncs 435, 212
ateniese, 2004, Identity-Based Chameleon Hash and Applications, Proc FC, lncs 3110, 164
shamir, 2001, Improved Online/Offline Signature Schemes, Proc Crypto, lncs 2139, 355
shi, 2007, Conditional E-Cash, Proc FC, lncs 4886, 15
nguyen, 1999, Distribution of Modular Sums and the Security of Server Aided Exponentiation, Proc Workshop Comput Number Theory Crypt, 1
matsumoto, 1988, Speeding up Secret Computations with Insecure Auxiliary Devices, Proc Crypto, lncs 403, 497
pedersen, 1992, Non-Interactive and Information-Theoretical Secure Verifiable Secret Sharing, Proc Crypto, lncs 576, 129
parno, 2012, How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, Proc TCC, lncs 7194, 422