메뉴 건너뛰기




Volumn 65, Issue 10, 2016, Pages 3184-3195

Verifiable computation over large database with incremental updates

Author keywords

incremental cryptography; outsourcing computations; vector commitment; Verifiable database

Indexed keywords

CRYPTOGRAPHY;

EID: 84987657487     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2015.2512870     Document Type: Article
Times cited : (250)

References (54)
  • 4
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • M. J. Atallah and J. Li, Secure outsourcing of sequence comparisons, Int. J. Inf. Security, vol. 4, pp. 277-287, 2005.
    • (2005) Int. J. Inf. Security , vol.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2
  • 14
    • 0000619172 scopus 로고
    • Self-testing/correcting with applications to numerical problems
    • M. Blum, M. Luby, and R. Rubinfeld, Self-testing/correcting with applications to numerical problems, J. Comput. Syst. Sci., pp. 549-595, 1993.
    • (1993) J. Comput. Syst. Sci. , pp. 549-595
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 18
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, in Proc. 6th Int. Conf. Theory Appl. Cryptol. Inf. Security, 2000, pp. 531-545.
    • (2000) Proc. 6th Int. Conf. Theory Appl. Cryptol. Inf. Security , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 25
  • 29
    • 84870282993 scopus 로고    scopus 로고
    • Efficient fair conditional payments for outsourcing computations
    • Dec
    • X. Chen, J. Li, and W. Susilo, Efficient fair conditional payments for outsourcing computations, IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1687-1694, Dec. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.6 , pp. 1687-1694
    • Chen, X.1    Li, J.2    Susilo, W.3
  • 33
    • 84879866739 scopus 로고    scopus 로고
    • Comparing the pairing efficiency over compositeorder and prime-order elliptic curves
    • A. Guillevic, Comparing the pairing efficiency over compositeorder and prime-order elliptic curves, in Proc. 11th Int. Conf. Appl. Cryptography Netw. Security, 2013, pp. 357-372.
    • (2013) Proc. 11th Int. Conf. Appl. Cryptography Netw. Security , pp. 357-372
    • Guillevic, A.1
  • 35
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof-systems, SIAM J. Comput., vol. 18, no. 1, pp. 186-208, 1989.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 37
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, Fully homomorphic encryption using ideal lattices, Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-178.
    • (2009) Proc. 41st Annu. ACM Symp. Theory Comput , pp. 169-178
    • Gentry, C.1
  • 39
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, in Proc. 30th Annu. Conf. Adv. Cryptol., 2010, pp. 465-482.
    • (2010) Proc. 30th Annu. Conf. Adv. Cryptol , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 42
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments
    • J. Kilian, A note on efficient zero-knowledge proofs and arguments, in Proc.ACMSymp. Theory Comput., 1992, pp. 723-732.
    • (1992) Proc.ACMSymp. Theory Comput , pp. 723-732
    • Kilian, J.1
  • 43
    • 84957654400 scopus 로고
    • Improved efficient arguments (preliminary version)
    • J. Kilian, Improved efficient arguments (preliminary version), in Proc. 15th Annu. Int. Cryptol. Conf., 1995, pp. 311-324. 1995.
    • (1995) Proc. 15th Annu. Int. Cryptol. Conf , vol.1995 , pp. 311-324
    • Kilian, J.1
  • 48
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • M. Naor and K. Nissim, Certificate revocation and certificate update, in Proc. 7th Conf. USENIX Security Symp., 1998, vol. 7, pp. 17-17.
    • (1998) Proc. 7th Conf. USENIX Security Symp , vol.7 , pp. 17
    • Naor, M.1    Nissim, K.2
  • 49
    • 33750245651 scopus 로고    scopus 로고
    • Accumulators frombilinear pairings and applications
    • L. Nguyen, Accumulators frombilinear pairings and applications, in Proc. Cryptographers Track RSA Conf., 2005, pp. 75-292.
    • (2005) Proc. Cryptographers Track RSA Conf , pp. 75-292
    • Nguyen, L.1
  • 50
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • B. Parno, M. Raykova and V. Vaikuntanathan, How to delegate and verify in public: Verifiable computation from attribute-based encryption, in Proc. 9th Theory of Cryptography Conf., 2012, pp. 422-439.
    • (2012) Proc. 9th Theory of Cryptography Conf , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 51
    • 38149124777 scopus 로고    scopus 로고
    • Time and space efficient algorithms for two-party authenticated data structures
    • C. Papamanthou and R. Tamassia, Time and space efficient algorithms for two-party authenticated data structures, in Proc. 9th Int. Conf. Inf. Commun. Security, 2007, pp. 1-15.
    • (2007) Proc. 9th Int. Conf. Inf. Commun. Security , pp. 1-15
    • Papamanthou, C.1    Tamassia, R.2
  • 53
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • C. Wang, K. Ren, and J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in Proc. 30th IEEE Int. Conf. Comput. Commun., 2011, pp. 820-828.
    • (2011) Proc. 30th IEEE Int. Conf. Comput. Commun , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 54
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • Jun
    • C. Wang, K. Ren, J. Wang, and Q. Wang, Harnessing the cloud for securely outsourcing large-scale systems of linear equations, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1172-1181, Jun. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Ren, K.2    Wang, J.3    Wang, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.