메뉴 건너뛰기




Volumn 8712 LNCS, Issue PART 1, 2014, Pages 148-162

Verifiable computation over large database with incremental updates

Author keywords

incremental Cryptography; outsourcing computations; vector commitment; verifiable Database

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84906510644     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11203-9_9     Document Type: Conference Paper
Times cited : (39)

References (31)
  • 5
    • 85024585723 scopus 로고
    • Incremental cryptography: The case of hashing and signing
    • In: Desmedt, Y.G. (ed.). Springer, Heidelberg
    • Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography: The case of hashing and signing. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 216-233. Springer, Heidelberg (1994)
    • (1994) CRYPTO 1994. LNCS , vol.839 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 7
    • 84958971416 scopus 로고    scopus 로고
    • Incremental unforgeable encryption
    • In: Matsui, M. (ed.). Springer, Heidelberg
    • Buonanno, E., Katz, J., Yung,M.: Incremental Unforgeable Encryption. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 109-124. Springer, Heidelberg (2002)
    • (2002) FSE 2001. LNCS , vol.2355 , pp. 109-124
    • Buonanno, E.1    Katz, J.2    Yung, M.3
  • 10
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairings
    • In: Boyd, C. (ed.). Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairings. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) ASIACRYPT 2001. LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 11
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • In: Okamoto, T. (ed.). Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) ASIACRYPT 2000. LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 12
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • In: Rogaway, P. (ed.). Springer, Heidelberg
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 13
    • 84873948499 scopus 로고    scopus 로고
    • Vector commitments and their applications
    • In: Kurosawa, K., Hanaoka, G. (eds.). Springer, Heidelberg
    • Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55-72. Springer, Heidelberg (2013)
    • (2013) PKC 2013. LNCS , vol.7778 , pp. 55-72
    • Catalano, D.1    Fiore, D.2
  • 14
    • 38049146172 scopus 로고    scopus 로고
    • Batch verification of short signatures
    • In: Naor, M. (ed.). Springer, Heidelberg
    • Camenisch, J., Hohenberger, S., Pedersen, M.: Batch Verification of Short Signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 246-263. Springer, Heidelberg (2007)
    • (2007) Eurocrypt 2007. LNCS , vol.4515 , pp. 246-263
    • Camenisch, J.1    Hohenberger, S.2    Pedersen, M.3
  • 15
    • 67049119910 scopus 로고    scopus 로고
    • An accumulator based on bilinear maps and efficient revocation for anonymous credentials
    • In: Jarecki, S., Tsudik, G. (eds.). Springer, Heidelberg
    • Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
    • (2009) PKC 2009. LNCS , vol.5443 , pp. 481-500
    • Camenisch, J.1    Kohlweiss, M.2    Soriente, C.3
  • 16
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • In: Yung, M. (ed.). Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
    • (2002) CRYPTO 2002. LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 19
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • In: Foresti, S., Yung, M., Martinelli, F. (eds.). Springer, Heidelberg
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
    • (2012) ESORICS 2012. LNCS , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 21
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal on Computing 18(1), 186-208 (1989)
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 22
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • In: Rabin, T. (ed.). Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 24
    • 84957654400 scopus 로고
    • Improved efficient arguments
    • In: Coppersmith, D. (ed.) Springer, Heidelberg
    • Kilian, J.: Improved efficient arguments. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 311-324. Springer, Heidelberg (1995)
    • (1995) CRYPTO 1995. LNCS , vol.963 , pp. 311-324
    • Kilian, J.1
  • 26
    • 84860006920 scopus 로고    scopus 로고
    • Incremental deterministic public-key encryption
    • In: Pointcheval, D., Johansson, T. (eds.) Springer, Heidelberg
    • Mironov, I., Pandey, O., Reingold, O., Segev, G.: Incremental Deterministic Public-Key Encryption. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 628-644. Springer, Heidelberg (2012)
    • (2012) Eurocrypt 2012. LNCS , vol.7237 , pp. 628-644
    • Mironov, I.1    Pandey, O.2    Reingold, O.3    Segev, G.4
  • 29
    • 24144480841 scopus 로고    scopus 로고
    • Accumulators from bilinear pairings and applications
    • In: Menezes, A. (ed.) Springer, Heidelberg
    • Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275-292. Springer, Heidelberg (2005)
    • (2005) CT-RSA 2005. LNCS , vol.3376 , pp. 275-292
    • Nguyen, L.1
  • 30
    • 38149124777 scopus 로고    scopus 로고
    • Time and space efficient algorithms for two-party authenticated data structures
    • In: Qing, S., Imai, H., Wang, G. (eds.) Springer, Heidelberg
    • Papamanthou, C., Tamassia, R.: Time and space efficient algorithms for two-party authenticated data structures. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 1-15. Springer, Heidelberg (2007)
    • (2007) ICICS 2007. LNCS , vol.4861 , pp. 1-15
    • Papamanthou, C.1    Tamassia, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.