New Publicly Verifiable Databases with Efficient Updates
Tóm tắt
Từ khóa
Tài liệu tham khảo
kilian, 0, A note on efficient zero-knowledge proofs and arguments, Proc ACM Symp Theory Comput, 723
hohenberger, 0, How to securely outsource cryptographic computations, Proc 2nd Theory Cryptography Conf, 264
golle, 0, Uncheatable distributed computations, Proc Cryptographers' Track RSA Conf Topics Cryptology, 425
0
gennaro, 0, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, Proc 30th Annu Conf Adv Cryptol, 465
gentry, 0, Implementing Gentry’s fully-homomorphic encryption scheme, Proc 30th Annu Int Conf Theory Appl Cryptographic Techn Adv Cryptol, 129
chen, 0, Verifiable computation over large database with incremental updates, Proc Euro Symp Res Computer Security, 148
atallah, 0, Securely outsourcing linear algebra computations, Proc 5th ACM Symp Inf Comput Commun Security, 48
camenisch, 0, Dynamic accumulators and application to efficient revocation of anony- mous credentials, Proc 22nd Annu Int Cryptol Conf Adv Cryptol, 61
carbunar, 0, Conditional payments for computing markets, Proc Int Conf Cryptology Netw Security, 317
chen, 0, New algorithms for secure outsourcing of modular exponentiations, Proc Eur Symp Res Comput Security, 541
zhang, 0, Verifiable delegation of computations with storage-verification trade-off, Proc Euro Symp Res Computer Security, 112
tamassia, 0, Proc Alberto Mendelzon Workshop Found Data Manage
blanton, 0, Secure and efficient outsourcing of sequence comparisons, Proc Euro Symp Res Computer Security, 505
kilian, 0, Improved efficient arguments (preliminary version), Proc Annu Int Cryptol Conf Adv Cryptol, 311
boyko, 0, Speeding up discrete log and factoring based schemes via precomputations, Proc Int Conf Theory Appl Cryptographic Techn, 221
benabbas, 0, Verifiable delegation of computation over large datasets, Proc 31st Annu Conf Adv Crypt, 111
chevallier-mames, 0, Secure delegation of elliptic-curve pairing, Proc 9th IFIP WG 8 8/11 2 Int Conf Smart Card Res Adv Appl, 24
catalano, 0, Vector commitments and their applications, Proc PKC, 55
camenisch, 0, An accumulator based on bilinear maps and efficient revocation for anonymous credentials, Proc 12th Int Conf Practice Theory Public Key Cryptography, 481
atallah, 2001, Secure outsourcing of scientific computations, Adv Comput, 54, 216
bao, 0, Variations of Diffie-Hellman problem, Proc Int Conf Commun Syst, 301
parno, 0, How to delegate and verify in public: verifiable computation from attribute-based encryption, Proc 9th Int Conf Theory Cryptography, 422
blum, 0, Program result checking against adaptive programs and in cryptographic settings, Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, 107
nguyen, 0, Accumulators from bilinear pairings and applications, Proc Int Conf Topics Cryptol, 275