-
1
-
-
77955319555
-
From secrecy to soundness: Efficient verification via secure computation
-
S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. Spirakis, editors, Springer Berlin /Heidelberg, 10.1007/978-3-642-14165-2-14
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. From secrecy to soundness: Efficient verification via secure computation. In S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. Spirakis, editors, Automata, Languages and Programming, volume 6198 of Lecture Notes in Computer Science, pages 152-163. Springer Berlin /Heidelberg, 2010. 10.1007/978-3-642-14165-2-14.
-
Automata, Languages and Programming, Volume 6198 of Lecture Notes in Computer Science
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
New York, NY, USA, ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 598-609, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
Berlin, Heidelberg, Springer-Verlag
-
G. Ateniese, S. Kamara, and J. Katz. Proofs of storage from homomorphic identification protocols. In Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '09, pages 319-333, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '09
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
5
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Berlin, Heidelberg, Springer-Verlag
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, EUROCRYPT'03, pages 416-432, Berlin, Heidelberg, 2003. Springer-Verlag.
-
(2003)
Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT'03
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Berlin, Heidelberg, Springer-Verlag
-
K.-M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. In Proceedings of the 30th annual conference on Advances in cryptology, CRYPTO'10, pages 483-501, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 30th Annual Conference on Advances in Cryptology, CRYPTO'10
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
7
-
-
0038274733
-
Authentic data publication over the internet
-
Apr
-
P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic data publication over the internet. J. Comput. Secur., 11(3):291-314, Apr. 2003.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
8
-
-
74049121230
-
Dynamic provable data possession
-
New York, NY, USA, ACM
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 213-222, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
9
-
-
84921021973
-
Batch rsa
-
New York, NY, USA, Springer-Verlag New York, Inc
-
A. Fiat. Batch rsa. In Proceedings on Advances in cryptology, CRYPTO '89, pages 175-185, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
-
(1989)
Proceedings on Advances in Cryptology, CRYPTO '89
, pp. 175-185
-
-
Fiat, A.1
-
10
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Berlin, Heidelberg, Springer-Verlag
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In Proceedings of the 30th annual conference on Advances in cryptology, CRYPTO'10, pages 465-482, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 30th Annual Conference on Advances in Cryptology, CRYPTO'10
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
11
-
-
43149099270
-
Super-efficient verification of dynamic outsourced databases
-
T. Malkin, editor. Springer Berlin /Heidelberg
-
M. Goodrich, R. Tamassia, and N. Triandopoulos. Super-efficient verification of dynamic outsourced databases. In T. Malkin, editor, Topics in Cryptology ́lC CT-RSA 2008, volume 4964 of Lecture Notes in Computer Science, pages 407-424. Springer Berlin /Heidelberg, 2008.
-
(2008)
Topics in Cryptology ́lC CT-RSA 2008, Volume 4964 of Lecture Notes in Computer Science
, pp. 407-424
-
-
Goodrich, M.1
Tamassia, R.2
Triandopoulos, N.3
-
12
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
New York, NY, USA, ACM
-
A. Juels and B. S. Kaliski, Jr. Pors: proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 584-597, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
13
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
New York, NY, USA, ACM
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proceedings of the 2006 ACM SIGMOD international conference on Management of data, SIGMOD '06, pages 121-132, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD '06
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
14
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
Dec
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur., 13(4):32:1-32:35, Dec. 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4
, pp. 321-3235
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
15
-
-
84969346266
-
A certified digital signature
-
New York, NY, USA, Springer-Verlag New York, Inc
-
R. C. Merkle. A certified digital signature. In Proceedings on Advances in cryptology, CRYPTO '89, pages 218-238, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
-
(1989)
Proceedings on Advances in Cryptology, CRYPTO '89
, pp. 218-238
-
-
Merkle, R.C.1
-
16
-
-
58149462240
-
Partially materialized digest scheme: An efficient verification method for outsourced databases
-
Jan
-
K. Mouratidis, D. Sacharidis, and H. Pang. Partially materialized digest scheme: an efficient verification method for outsourced databases. The VLDB Journal, 18(1):363-381, Jan. 2009.
-
(2009)
The VLDB Journal
, vol.18
, Issue.1
, pp. 363-381
-
-
Mouratidis, K.1
Sacharidis, D.2
Pang, H.3
-
18
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
May
-
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. Trans. Storage, 2(2):107-138, May 2006.
-
(2006)
Trans. Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
19
-
-
33745528450
-
Authentication of outsourced databases using signature aggregation and chaining
-
Berlin, Heidelberg, Springer-Verlag
-
M. Narasimha and G. Tsudik. Authentication of outsourced databases using signature aggregation and chaining. In Proceedings of the 11th international conference on Database Systems for Advanced Applications, DASFAA'06, pages 420-436, Berlin, Heidelberg, 2006. Springer-Verlag.
-
(2006)
Proceedings of the 11th International Conference on Database Systems for Advanced Applications, DASFAA'06
, pp. 420-436
-
-
Narasimha, M.1
Tsudik, G.2
-
20
-
-
26444554946
-
Verified query results from hybrid authentication trees
-
Berlin, Heidelberg, Springer-Verlag
-
G. Nuckolls. Verified query results from hybrid authentication trees. In Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security, DBSec'05, pages 84-98, Berlin, Heidelberg, 2005. Springer-Verlag.
-
(2005)
Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec'05
, pp. 84-98
-
-
Nuckolls, G.1
-
21
-
-
77958460202
-
Query racing: Fast completeness certification of query results
-
Berlin, Heidelberg, Springer-Verlag
-
B. Palazzi, M. Pizzonia, and S. Pucacco. Query racing: fast completeness certification of query results. In Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, DBSec'10, pages 177-192, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec'10
, pp. 177-192
-
-
Palazzi, B.1
Pizzonia, M.2
Pucacco, S.3
-
22
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
New York, NY, USA, ACM
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying completeness of relational query results in data publishing. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, SIGMOD '05, pages 407-418, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD '05
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
23
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
Aug
-
H. Pang, J. Zhang, and K. Mouratidis. Scalable verification for outsourced dynamic databases. Proc. VLDB Endow., 2(1):802-813, Aug. 2009.
-
(2009)
Proc. VLDB Endow.
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
24
-
-
68849097095
-
Authenticated hash tables
-
New York, NY, USA, ACM
-
C. Papamanthou, R. Tamassia, and N. Triandopoulos. Authenticated hash tables. In Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pages 437-448, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08
, pp. 437-448
-
-
Papamanthou, C.1
Tamassia, R.2
Triandopoulos, N.3
-
25
-
-
80051963720
-
Optimal verification of operations on dynamic sets
-
Berlin, Heidelberg, Springer-Verlag
-
C. Papamanthou, R. Tamassia, and N. Triandopoulos. Optimal verification of operations on dynamic sets. In Proceedings of the 31st annual conference on Advances in cryptology, CRYPTO'11, pages 91-110, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 31st Annual Conference on Advances in Cryptology, CRYPTO'11
, pp. 91-110
-
-
Papamanthou, C.1
Tamassia, R.2
Triandopoulos, N.3
-
26
-
-
58349118819
-
Compact proofs of retrievability
-
Berlin, Heidelberg. Springer-Verlag
-
H. Shacham and B. Waters. Compact proofs of retrievability. In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '08, pages 90-107, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
27
-
-
80051966302
-
Certification and authentication of data structures
-
R. Tamassia and N. Triandopoulos. Certification and authentication of data structures. In AMW, 2010.
-
(2010)
AMW
-
-
Tamassia, R.1
Triandopoulos, N.2
-
28
-
-
84997556980
-
Integrity auditing of outsourced data
-
VLDB Endowment
-
M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In Proceedings of the 33rd international conference on Very large data bases, VLDB '07, pages 782-793. VLDB Endowment, 2007.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB '07
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
30
-
-
70849087019
-
Authenticated join processing in outsourced databases
-
New York, NY, USA, ACM
-
Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis. Authenticated join processing in outsourced databases. In Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pages 5-18, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 35th SIGMOD International Conference on Management of Data, SIGMOD '09
, pp. 5-18
-
-
Yang, Y.1
Papadias, D.2
Papadopoulos, S.3
Kalnis, P.4
-
31
-
-
52649150749
-
Spatial outsourcing for location-based services
-
Washington, DC, USA, IEEE Computer Society
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial outsourcing for location-based services. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE '08, pages 1082-1091, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE '08
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
|