-
2
-
-
77956778645
-
Secure outsourcing of scientific computations
-
Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Advances in Computers 54, 216-272 (2001)
-
(2001)
Advances in Computers
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.H.4
-
3
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable Delegation of Computation on Outsourced Data. In: Proceedings of the ACM conference on Computer and Communications Security (CCS), pp. 863-874 (2013)
-
(2013)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
4
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A.: Multi-prover interactive proofs: How to remove intractability assumptions. In: Proceedings of the ACM Symposium on Theory of Computing (STOC), pp. 113-131 (1988)
-
(1988)
Proceedings of the ACM Symposium on Theory of Computing (STOC)
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
5
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
In: Desmedt, Y.G. (ed.). Springer, Heidelberg
-
Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography: The case of hashing and signing. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 216-233. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1994. LNCS
, vol.839
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
Bellare, M., Goldreich, O., Goldwasser, S.: Incremental Cryptography and Application to Virus Protection. In: Proceedings of the 27th ACM Symposium on the Theory of Computing (STOC), pp. 45-56 (1995)
-
(1995)
Proceedings of the 27th ACM Symposium on the Theory of Computing (STOC)
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
7
-
-
84958971416
-
Incremental unforgeable encryption
-
In: Matsui, M. (ed.). Springer, Heidelberg
-
Buonanno, E., Katz, J., Yung,M.: Incremental Unforgeable Encryption. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 109-124. Springer, Heidelberg (2002)
-
(2002)
FSE 2001. LNCS
, vol.2355
, pp. 109-124
-
-
Buonanno, E.1
Katz, J.2
Yung, M.3
-
8
-
-
8644237883
-
Program result checking against adaptive programs and in cryptographic settings
-
Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pp. 107-118 (1991)
-
(1991)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, pp. 107-118
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
9
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. Journal of Computer and System Science, 549-595 (1993)
-
(1993)
Journal of Computer and System Science
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
10
-
-
84946840347
-
Short signatures from the Weil pairings
-
In: Boyd, C. (ed.). Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairings. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
ASIACRYPT 2001. LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
In: Okamoto, T. (ed.). Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
ASIACRYPT 2000. LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
12
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
In: Rogaway, P. (ed.). Springer, Heidelberg
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
13
-
-
84873948499
-
Vector commitments and their applications
-
In: Kurosawa, K., Hanaoka, G. (eds.). Springer, Heidelberg
-
Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55-72. Springer, Heidelberg (2013)
-
(2013)
PKC 2013. LNCS
, vol.7778
, pp. 55-72
-
-
Catalano, D.1
Fiore, D.2
-
14
-
-
38049146172
-
Batch verification of short signatures
-
In: Naor, M. (ed.). Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Pedersen, M.: Batch Verification of Short Signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 246-263. Springer, Heidelberg (2007)
-
(2007)
Eurocrypt 2007. LNCS
, vol.4515
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
15
-
-
67049119910
-
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
-
In: Jarecki, S., Tsudik, G. (eds.). Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
16
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
In: Yung, M. (ed.). Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
80755169473
-
Practical delegation of computation using multiple servers
-
Canetti, R., Riva, B., Rothblum, G.: Practical delegation of computation using multiple servers. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 445-454 (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
, pp. 445-454
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.3
-
18
-
-
84870282993
-
Efficient fair conditional payments for outsourcing computations
-
Chen, X., Li, J., Susilo, W.: Efficient Fair Conditional Payments for Outsourcing Computations. IEEE Transactions on Information Forensics and Security 7(6), 1687-1694 (2012)
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1687-1694
-
-
Chen, X.1
Li, J.2
Susilo, W.3
-
19
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
In: Foresti, S., Yung, M., Martinelli, F. (eds.). Springer, Heidelberg
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
-
(2012)
ESORICS 2012. LNCS
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
20
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: Proceedings of the ACM Symposium on the Theory of Computing (STOC), pp. 113-122 (2008)
-
(2008)
Proceedings of the ACM Symposium on the Theory of Computing (STOC)
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
21
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal on Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
22
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
In: Rabin, T. (ed.). Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
24
-
-
84957654400
-
Improved efficient arguments
-
In: Coppersmith, D. (ed.) Springer, Heidelberg
-
Kilian, J.: Improved efficient arguments. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 311-324. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995. LNCS
, vol.963
, pp. 311-324
-
-
Kilian, J.1
-
26
-
-
84860006920
-
Incremental deterministic public-key encryption
-
In: Pointcheval, D., Johansson, T. (eds.) Springer, Heidelberg
-
Mironov, I., Pandey, O., Reingold, O., Segev, G.: Incremental Deterministic Public-Key Encryption. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 628-644. Springer, Heidelberg (2012)
-
(2012)
Eurocrypt 2012. LNCS
, vol.7237
, pp. 628-644
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Segev, G.4
-
27
-
-
21044438930
-
A general model for authenticated data structures
-
Martel, C.U., Nuckolls, G., Devanbu, P.T., Gertz, M., Kwong, A., Stubblebine, S.G.: A general model for authenticated data structures. Algorithmica 39(1), 21-41 (2004)
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.U.1
Nuckolls, G.2
Devanbu, P.T.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
29
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
In: Menezes, A. (ed.) Springer, Heidelberg
-
Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275-292. Springer, Heidelberg (2005)
-
(2005)
CT-RSA 2005. LNCS
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
30
-
-
38149124777
-
Time and space efficient algorithms for two-party authenticated data structures
-
In: Qing, S., Imai, H., Wang, G. (eds.) Springer, Heidelberg
-
Papamanthou, C., Tamassia, R.: Time and space efficient algorithms for two-party authenticated data structures. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 1-15. Springer, Heidelberg (2007)
-
(2007)
ICICS 2007. LNCS
, vol.4861
, pp. 1-15
-
-
Papamanthou, C.1
Tamassia, R.2
|