메뉴 건너뛰기




Volumn 286, Issue , 2014, Pages 19-28

Efficient computation outsourcing for inverting a class of homomorphic functions

Author keywords

Computation outsourcing; Homomorphic function; Privacy; Security

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; MOBILE DEVICES; OUTSOURCING;

EID: 84906655458     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2014.07.017     Document Type: Article
Times cited : (20)

References (33)
  • 9
    • 84857752323 scopus 로고    scopus 로고
    • Delegatable homomorphic encryption with applicatoins to secure outsourcing of computation
    • M. Barbosa, P. Farshim, Delegatable homomorphic encryption with applicatoins to secure outsourcing of computation, in: Topics in Cryptology - CT-RSA 2012, LNCS 7178, 2012, pp. 296-312.
    • (2012) Topics in Cryptology - CT-RSA 2012, LNCS 7178 , pp. 296-312
    • Barbosa, M.1    Farshim, P.2
  • 12
    • 0003226285 scopus 로고    scopus 로고
    • A course in computational algebraic number theory
    • H. Cohen A course in computational algebraic number theory Grad. Tests Math. 138 1996
    • (1996) Grad. Tests Math. , vol.138
    • Cohen, H.1
  • 16
  • 17
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Computation outsourcing to untrusted workers
    • R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: computation outsourcing to untrusted workers, in: Advances in CryptologyCCRYPTO 2010, LNCS 6223, 2010, pp. 465-482.
    • (2010) Advances in CryptologyCCRYPTO 2010, LNCS 6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 18
  • 20
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff The knowledge complexity of interactive proof systems SIAM J. Comput. 18 1 1989 186 208
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 28
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • LNCS 7194
    • B. Parno, M. Raykova, V. Vaikuntanathan, How to delegate and verify in public: verifiable computation from attribute-based encryption, in: Theory of Cryptography-TCC 2012, LNCS 7194, 2012, pp. 422-439.
    • (2012) Theory of Cryptography-TCC 2012 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 31
  • 33
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A.V. Vasilakos Security and privacy for storage and computation in cloud computing Inform. Sci. 258 2014 371 386
    • (2014) Inform. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.