메뉴 건너뛰기




Volumn , Issue , 2011, Pages 125-129

Towards ensuring client-side computational integrity (A position paper)

Author keywords

Cloud computing; Confidentiality; Cryptography; Integrity; Living by numbers; Personal data management

Indexed keywords

BUILDING BLOCKES; CONFIDENTIALITY; EFFECTIVE SOLUTION; FULLY HOMOMORPHIC ENCRYPTION; INTEGRITY; LIVING BY NUMBERS; MOVING SERVICES; POSITION PAPERS; PRIVACY PROBLEMS; SECURITY PROPERTIES;

EID: 80955131279     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046660.2046683     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 2
    • 84957366640 scopus 로고    scopus 로고
    • Rapid Demonstration of Linear Relations Connected by Boolean Operators
    • Advances in Cryptology - Eurocrypt '97
    • S. Brands. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT, pages 318-333, 1997. (Pubitemid 127067810)
    • (1997) Lecture Notes in Computer Science , Issue.1233 , pp. 318-333
    • Brands, S.1
  • 3
    • 58349085879 scopus 로고    scopus 로고
    • Efficient protocols for set membership and range proofs
    • J. Pieprzyk, editor of Lecture Notes in Computer Science Springer
    • J. Camenisch, R. Chaabouni, and A. Shelat. Efficient protocols for set membership and range proofs. In J. Pieprzyk, editor, ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, pages 234-252. Springer, 2008.
    • (2008) ASIACRYPT , vol.5350 , pp. 234-252
    • Camenisch, J.1    Chaabouni, R.2    Shelat, A.3
  • 4
    • 23944501377 scopus 로고    scopus 로고
    • Group signatures: Better efficiency and new theoretical aspects
    • C. Blundo and S. Cimato, editors of LNCS Springer
    • J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In C. Blundo and S. Cimato, editors, SCN, volume 3352 of LNCS, pages 120-133. Springer, 2004.
    • (2004) SCN , vol.3352 , pp. 120-133
    • Camenisch, J.1    Groth, J.2
  • 5
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In EUROCRYPT, pages 107-122, 1999.
    • (1999) EUROCRYPT , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 6
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • of LNCS
    • D. Chaum and T. Pedersen. Wallet databases with observers. In CRYPTO '92, volume 740 of LNCS, pages 89-105, 1993.
    • (1993) CRYPTO '92 , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 7
    • 78650219479 scopus 로고    scopus 로고
    • On securing untrusted clouds with cryptography
    • E. Al-Shaer and K. B. Frikken, editors ACM
    • Y. Chen and R. Sion. On securing untrusted clouds with cryptography. In E. Al-Shaer and K. B. Frikken, editors, WPES, pages 109-114. ACM, 2010.
    • (2010) WPES , pp. 109-114
    • Chen, Y.1    Sion, R.2
  • 8
    • 84889076282 scopus 로고    scopus 로고
    • Cryptographic protocols of the identity mixer library, v. 2.3.0
    • M. Dworkin. Cryptographic protocols of the identity mixer library, v. 2.3.0. IBM research report RZ3730, IBM Research, 2010. http://domino.research. ibm.com/library/cyberdig.nsf/index.html.
    • (2010) IBM Research Report RZ3730, IBM Research
    • Dworkin, M.1
  • 9
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3):97-105, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 10
    • 79957974657 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomorphic encryption scheme
    • K. G. Paterson, editor of Lecture Notes in Computer Science
    • C. Gentry and S. Halevi. Implementing gentry's fully-homomorphic encryption scheme. In K. G. Paterson, editor, EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, pages 129-148, 2011.
    • (2011) EUROCRYPT , vol.6632 , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 11
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, editors of Lecture Notes in Computer Science
    • S. Kamara and K. Lauter. Cryptographic cloud storage. In R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 136-149, 2010.
    • (2010) Financial Cryptography Workshops , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 13
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.-P. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.-P.1
  • 14
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • P. Q. Nguyen and D. Pointcheval, editors of Lecture Notes in Computer Science
    • N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In P. Q. Nguyen and D. Pointcheval, editors, Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, pages 420-443, 2010.
    • (2010) Public Key Cryptography , vol.6056 , pp. 420-443
    • Smart, N.P.1    Vercauteren, F.2
  • 16
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • H. Gilbert, editor of Lecture Notes in Computer Science
    • M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In H. Gilbert, editor, EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, pages 24-43, 2010.
    • (2010) EUROCRYPT , vol.6110 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4
  • 17
    • 80955132187 scopus 로고    scopus 로고
    • Living by numbers
    • Wired Magazine July
    • Wired Magazine. Living by numbers. Wired Magazine, July 2011.
    • (2011) Wired Magazine


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.