메뉴 건너뛰기




Volumn 9440, Issue , 2015, Pages 156-173

Efficient and secure delegation of group exponentiation to a single server

Author keywords

[No Author keywords available]

Indexed keywords

POLYNOMIAL APPROXIMATION; RADIO FREQUENCY IDENTIFICATION (RFID); RADIO WAVES;

EID: 84951041666     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-24837-0_10     Document Type: Conference Paper
Times cited : (28)

References (13)
  • 1
    • 84921068804 scopus 로고    scopus 로고
    • Implementing public-key cryptography on passive RFID tags is practical
    • Arbit, A., Livne, Y., Oren, Y., Wool, A.: Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1), 85-99 (2015).
    • (2015) Int. J. Inf. Sec , vol.14 , Issue.1 , pp. 85-99
    • Arbit, A.1    Livne, Y.2    Oren, Y.3    Wool, A.4
  • 2
    • 85034497704 scopus 로고
    • Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor
    • Odlyzko, A.M. (ed.),. Springer, Heidelberg
    • Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A. M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311-323. Springer, Heidelberg (1987).
    • (1987) CRYPTO 1986. LNCS , vol.263 , pp. 311-323
    • Barrett, P.1
  • 4
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputations
    • Nyberg, K. (ed.),. Springer, Heidelberg
    • Boyko, V., Peinado, M., Venkatesan, R.: Speeding up discrete log and factoring based schemes via precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221-235. Springer, Heidelberg (1998).
    • (1998) EUROCRYPT 1998. LNCS , vol.1403 , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 5
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Foresti, S., Yung, M., Martinelli, F. (eds.),. Springer, Heidelberg
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012).
    • (2012) ESORICS 2012. LNCS , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 7
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.),. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010).
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 8
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • Kilian, J. (ed.),. Springer, Heidelberg
    • Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005).
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 9
    • 84937432284 scopus 로고    scopus 로고
    • Secure server-aided signature generation
    • Kim, K. (ed.),. Springer, Heidelberg
    • Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 383-401. Springer, Heidelberg (2001).
    • (2001) PKC 2001. LNCS , vol.1992 , pp. 383-401
    • Jakobsson, M.1    Wetzel, S.2
  • 10
    • 84888824020 scopus 로고    scopus 로고
    • Outsourcing computation of modular exponentiations in cloud computing
    • Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Computing 16, 787-796 (2013).
    • (2013) Cluster Computing , vol.16 , pp. 787-796
    • Ma, X.1    Li, J.2    Zhang, F.3
  • 11
    • 0009268999 scopus 로고    scopus 로고
    • Distribution of modular sums and the security of the server aided exponentiation
    • Springer
    • Nguyen, P. Q., Shparlinski, I. E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. In: Cryptography and Computational Number Theory, pp. 331-342. Springer (2001).
    • (2001) Cryptography and Computational Number Theory , pp. 331-342
    • Nguyen, P.Q.1    Shparlinski, I.E.2    Stern, J.3
  • 12
    • 84988269540 scopus 로고    scopus 로고
    • Securely outsourcing exponentiations with single untrusted program for cloud storage
    • Kutyłowski, M., Vaidya, J. (eds.), Part I. LNCS,. Springer, Heidelberg
    • Wang, Y., Wu, Q., Wong, D. S., Qin, B., Chow, S. S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 326-343. Springer, Heidelberg (2014).
    • (2014) ICAIS 2014 , vol.8712 , pp. 326-343
    • Wang, Y.1    Wu, Q.2    Wong, D.S.3    Qin, B.4    Chow, S.S.M.5    Liu, Z.6    Tan, X.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.