메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 541-556

New algorithms for secure outsourcing of modular exponentiations

Author keywords

Cloud computing; Modular exponentiation; Outsource secure algorithms

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; EXPONENTIATIONS; MODULAR EXPONENTIATION; MODULAR EXPONENTIATIONS; SCHNORR SIGNATURE; SECURITY NOTION; STATE-OF-THE-ART ALGORITHMS;

EID: 84865597567     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_31     Document Type: Conference Paper
Times cited : (129)

References (46)
  • 5
    • 35048873387 scopus 로고    scopus 로고
    • Identity-Based Chameleon Hash and Applications
    • Juels, A. (ed.) FC 2004. Springer, Heidelberg
    • Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164-180. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3110 , pp. 164-180
    • Ateniese, G.1    De Medeiros, B.2
  • 6
    • 23944526438 scopus 로고    scopus 로고
    • On the Key Exposure Problem in Chameleon Hashes
    • Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
    • Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165-179. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3352 , pp. 165-179
    • Ateniese, G.1    De Medeiros, B.2
  • 7
    • 45749113016 scopus 로고    scopus 로고
    • Improved Conditional E-Payments
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
    • Blanton, M.: Improved Conditional E-Payments. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 188-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5037 , pp. 188-206
    • Blanton, M.1
  • 12
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable Delegation of Computation over Large Datasets
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable Delegation of Computation over Large Datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 15
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up Discrete Log and Factoring Based Schemes via Precomputations
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Boyko, V., Peinado, M., Venkatesan, R.: Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221-235. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 16
    • 84957093995 scopus 로고    scopus 로고
    • On Concurrent Zero-Knowledge with Preprocessing (Extended Abstract)
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Di Crescenzo, G., Ostrovsky, R.: On Concurrent Zero-Knowledge with Preprocessing (Extended Abstract). In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 485-502. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 485-502
    • Di Crescenzo, G.1    Ostrovsky, R.2
  • 17
    • 85001025766 scopus 로고
    • Wallet Databases with Observers
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 18
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal of Computing 33, 167-226 (2003)
    • (2003) SIAM Journal of Computing , vol.33 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 19
    • 58449123075 scopus 로고    scopus 로고
    • Conditional Payments for Computing Markets
    • Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
    • Carbunar, B., Tripunitara, M.: Conditional Payments for Computing Markets. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 317-331. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5339 , pp. 317-331
    • Carbunar, B.1    Tripunitara, M.2
  • 21
    • 35048828982 scopus 로고    scopus 로고
    • Chameleon Hashing Without Key Exposure
    • Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
    • Chen, X., Zhang, F., Kim, K.: Chameleon Hashing Without Key Exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87-98. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3225 , pp. 87-98
    • Chen, X.1    Zhang, F.2    Kim, K.3
  • 22
    • 38049075273 scopus 로고    scopus 로고
    • Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 18-30. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 18-30
    • Chen, X.1    Zhang, F.2    Susilo, W.3    Mu, Y.4
  • 23
    • 84983134965 scopus 로고    scopus 로고
    • Efficient Non-malleable Commitment Schemes
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Fischlin, M., Fischlin, R.: Efficient Non-malleable Commitment Schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413-431. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 413-431
    • Fischlin, M.1    Fischlin, R.2
  • 25
    • 26444461753 scopus 로고    scopus 로고
    • Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-Middle Attacks
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Gennaro, R.: Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 220-236. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 220-236
    • Gennaro, R.1
  • 27
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 29
    • 33646773954 scopus 로고    scopus 로고
    • Server-Aided Verification: Theory and Practice
    • Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
    • Girault, M., Lefranc, D.: Server-Aided Verification: Theory and Practice. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 605-623. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 605-623
    • Girault, M.1    Lefranc, D.2
  • 30
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal on Computing 18(1), 186-208 (1989)
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 31
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable Distributed Computations
    • Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
    • Golle, P., Mironov, I.: Uncheatable Distributed Computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425-440. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2020 , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 32
    • 35248886595 scopus 로고    scopus 로고
    • Strengthening Zero-knowledge Protocols Using Signatures
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Garay, J., MacKenzie, P., Yang, K.: Strengthening Zero-knowledge Protocols Using Signatures. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 177-194. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 177-194
    • Garay, J.1    MacKenzie, P.2    Yang, K.3
  • 33
    • 24144493423 scopus 로고    scopus 로고
    • How to Securely Outsource Cryptographic Computations
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005), http://www.cs.jhu.edu/
    • (2005) LNCS , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 35
    • 84957654400 scopus 로고
    • Improved Efficient Arguments
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Kilian, J.: Improved Efficient Arguments. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 311-324. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 311-324
    • Kilian, J.1
  • 39
    • 85031767993 scopus 로고
    • Speeding up Secret Computations with Insecure Auxiliary Devices
    • Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
    • Matsumoto, T., Kato, K., Imai, H.: Speeding up Secret Computations with Insecure Auxiliary Devices. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 497-506. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 41
    • 84858307151 scopus 로고    scopus 로고
    • How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Parno, B., Raykova,M., Vaikuntanathan, V.: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 42
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 43
    • 38549097531 scopus 로고    scopus 로고
    • Conditional E-Cash
    • Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. Springer, Heidelberg
    • Shi, L., Carbunar, B., Sion, R.: Conditional E-Cash. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 15-28. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4886 , pp. 15-28
    • Shi, L.1    Carbunar, B.2    Sion, R.3
  • 44
    • 84880883264 scopus 로고    scopus 로고
    • Improved Online/Offline Signature Schemes
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 46
    • 57049172488 scopus 로고    scopus 로고
    • Server-Aided Verification Signatures: Definitions and New Constructions
    • Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. Springer, Heidelberg
    • Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-Aided Verification Signatures: Definitions and New Constructions. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 141-155. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5324 , pp. 141-155
    • Wu, W.1    Mu, Y.2    Susilo, W.3    Huang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.