메뉴 건너뛰기




Volumn , Issue , 2010, Pages 48-59

Securely outsourcing linear algebra computations

Author keywords

computational outsourcing; cryptographic protocols; privacy

Indexed keywords

ALGEBRAIC COMPUTATIONS; COMPUTATIONAL BURDEN; COMPUTATIONAL WORK; CRYPTOGRAPHIC COMPUTATIONS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; HIGH PROBABILITY; HOMOMORPHIC-ENCRYPTIONS; OUTSOURCE; REMOTE SERVERS; SINGLE SERVER; TIME COMPLEXITY;

EID: 77954521120     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755688.1755695     Document Type: Conference Paper
Times cited : (245)

References (32)
  • 2
    • 0023565941 scopus 로고
    • Generalized string matching
    • Karl R. Abrahamson. Generalized string matching. SIAM J. Comput., 16(6):1039-1051, 1987.
    • (1987) SIAM J. Comput. , vol.16 , Issue.6 , pp. 1039-1051
    • Abrahamson, K.R.1
  • 5
    • 84957639068 scopus 로고
    • Fast server-aided rsa signatures secure against active attacks
    • P. Beguin and J. J. Quisquater. Fast server-aided rsa signatures secure against active attacks. In CRYPT0 95, pages 57-69, 1995.
    • (1995) CRYPT0 95 , pp. 57-69
    • Beguin, P.1    Quisquater, J.J.2
  • 10
    • 33745124039 scopus 로고    scopus 로고
    • Constant-round multiparty computation using a black-box pseudorandom generator
    • Advances in Cryptology (CRYPT0 05), Springer-Verlag
    • I. Damgård and Y. Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Advances in Cryptology (CRYPT0 05), volume LNCS 3621, pages 378-394. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 378-394
    • Damgård, I.1    Ishai, Y.2
  • 11
    • 33745124039 scopus 로고    scopus 로고
    • Constant-round multiparty computation using a black-box pseudorandom generator
    • Advances in Cryptology (CRYPT0 05), Springer-Verlag
    • Ivan Damgård and Yuval Ishai. Constant-round multiparty computation using a black-box pseudorandom generator. In Advances in Cryptology (CRYPT0 05), volume LNCS 3621, pages 378-394. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 378-394
    • Damgård, I.1    Ishai, Y.2
  • 13
    • 26444461543 scopus 로고    scopus 로고
    • Searching for high-value rare events with uncheatable grid computing
    • Wenliang Du and Michael T. Goodrich. Searching for high-value rare events with uncheatable grid computing. In Proc. ACNS, pages 122-137, 2005.
    • (2005) Proc. ACNS , pp. 122-137
    • Du, W.1    Goodrich, M.T.2
  • 19
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • Theory of Cryptography Conference (TCC'05)
    • Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Theory of Cryptography Conference (TCC'05), volume 3378 of LNCS, pages 264-282, 2005.
    • (2005) LNCS , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 20
    • 77954516959 scopus 로고    scopus 로고
    • Round optimal secure two-party computation
    • Jonathan Katz and Rafail Ostrovsky. Round optimal secure two-party computation. In CRYPTO 04, 2004.
    • CRYPTO 04, 2004
    • Katz, J.1    Ostrovsky, R.2
  • 21
    • 0027617773 scopus 로고
    • Fast server-aided secret computation protocols for modular exponentiation
    • S. I. Kawamura and A. Shimbo. Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on Selected Areas in Communications, 11(5):778-784, 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.I.1    Shimbo, A.2
  • 22
    • 84957648348 scopus 로고
    • Security and performance of server-aided rsa computation protocols
    • C. H. Lim and P. J. Lee. Security and performance of server-aided rsa computation protocols. In CRYPT0 95, pages 70-83, 1995.
    • (1995) CRYPT0 95 , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 23
    • 35048833033 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Yehuda Lindell. Parallel coin-tossing and constant-round secure two-party computation. Lecture Notes in Computer Science, 2139:171-189, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 171-189
    • Lindell, Y.1
  • 25
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In CRYPT0 88, pages 497-506, 1988.
    • (1988) CRYPT0 88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 26
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology: EUROCRYPT '99, Springer
    • Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology: EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 27
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided rsa computations
    • B. Pfitzmann and M. Waidner. Attacks on protocols for server-aided rsa computations. In EUROCRYPT 92, pages 153-162, 1992.
    • (1992) EUROCRYPT 92 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • Adi Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.