-
1
-
-
84984903649
-
Tracing and revoking leaked credentials: Accountability in leaking sensitive outsourced data
-
ACM, New York
-
Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and Revoking Leaked Credentials: Accountability in Leaking Sensitive Outsourced Data. In: 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 425-443. ACM, New York (2014)
-
(2014)
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 425-443
-
-
Deng, H.1
Wu, Q.2
Qin, B.3
Chow, S.S.M.4
Domingo-Ferrer, J.5
Shi, W.6
-
2
-
-
84900818518
-
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
-
Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-Policy Hierarchical Attribute-Based Encryption with Short Ciphertexts. Information Sciences 275, 370-384 (2014)
-
(2014)
Information Sciences
, vol.275
, pp. 370-384
-
-
Deng, H.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
Zhang, L.5
Liu, J.6
Shi, W.7
-
3
-
-
84906504763
-
Who is touching my cloud
-
In: Kutylowski, M., Vaidya, J. (eds.) Springer, Heidelberg
-
Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is touching my cloud. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 362-379. Springer, Heidelberg (2014)
-
(2014)
ESORICS 2014. LNCS
, vol.8712
, pp. 362-379
-
-
Deng, H.1
Wu, Q.2
Qin, B.3
Mao, J.4
Liu, X.5
Zhang, L.6
Shi, W.7
-
4
-
-
35048854673
-
Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity
-
In: Lim, J.-I., Lee, D.-H. (eds.) Springer, Heidelberg
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
(2004)
ICISC 2003. LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
5
-
-
84888840097
-
Simultaneous authentication and secrecy in identity-based data upload to cloud
-
Qin, B., Wang, H., Wu, Q., Liu, J., Domingo-Ferrer, J.: Simultaneous Authentication and Secrecy in Identity-Based Data Upload to Cloud. Cluster Computing 16, 845-859 (2013)
-
(2013)
Cluster Computing
, vol.16
, pp. 845-859
-
-
Qin, B.1
Wang, H.2
Wu, Q.3
Liu, J.4
Domingo-Ferrer, J.5
-
6
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM, New York
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: 14th ACM Conference on Computer and Communications Security (CCS), pp. 598-609. ACM, New York (2007)
-
(2007)
14th ACM Conference on Computer and Communications Security (CCS)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
8
-
-
58349118819
-
Compact proofs of retrievability
-
In: Pieprzyk, J. (ed.) Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
9
-
-
84893341393
-
Storing shared data on the cloud via security-mediator
-
Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing Shared Data on the Cloud via Security-Mediator. In: 33rd IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 124-133 (2013)
-
(2013)
33rd IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 124-133
-
-
Wang, B.1
Chow, S.S.M.2
Li, M.3
Li, H.4
-
10
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Transactions on Computers 62(2), 362-375 (2013)
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
11
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
ACM, New York
-
Yuan, J., Yu, S.: Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud. In: International Workshop on Security in Cloud Computing, pp. 19-26. ACM, New York (2013)
-
(2013)
International Workshop on Security in Cloud Computing
, pp. 19-26
-
-
Yuan, J.1
Yu, S.2
-
12
-
-
24144493423
-
How to securely outsource cryptographic computations
-
In: Kilian, J. (ed.) Springer, Heidelberg
-
Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
13
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
In: Foresti, S., Yung, M., Martinelli, F. (eds.) Springer, Heidelberg
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New Algorithms for Secure Outsourcing of Modular Exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
-
(2012)
ESORICS 2012. LNCS
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
14
-
-
33645066370
-
Speeding up exponentiation using an untrusted computational resource
-
Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding up Exponentiation using an Untrusted Computational Resource. Designs, Codes and Cryptography 39(2), 253-273 (2006)
-
(2006)
Designs, Codes and Cryptography
, vol.39
, Issue.2
, pp. 253-273
-
-
Dijk, M.1
Clarke, D.2
Gassend, B.3
Suh, G.4
Devadas, S.5
-
15
-
-
84894562939
-
Identity-based remote data possession checking in public clouds
-
Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Remote Data Possession Checking in Public Clouds. Information Security, IET 8(2), 114-121 (2014)
-
(2014)
Information Security
, vol.IET 8
, Issue.2
, pp. 114-121
-
-
Wang, H.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
16
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
In: Abe, M. (ed.) Springer, Heidelberg
-
Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-Size Commitments to Polynomials and Their Applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177-194. Springer, Heidelberg (2010)
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
17
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
In: Rogaway, P. (ed.) Springer, Heidelberg
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable Delegation of Computation over Large Datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
18
-
-
84890089973
-
An efficient proof of retrievability with public auditing in cloud computing
-
Li, J., Tan, X., Chen, X., Wong, D.S.: An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 93-98 (2013)
-
(2013)
5th International Conference on Intelligent Networking and Collaborative Systems (INCoS)
, pp. 93-98
-
-
Li, J.1
Tan, X.2
Chen, X.3
Wong, D.S.4
-
19
-
-
84888824020
-
Outsourcing computation of modular exponentiations in cloud computing
-
Ma, X., Li, J., Zhang, F.: Outsourcing Computation of Modular Exponentiations in Cloud Computing. Cluster Computing 16(4), 787-796 (2013)
-
(2013)
Cluster Computing
, vol.16
, Issue.4
, pp. 787-796
-
-
Ma, X.1
Li, J.2
Zhang, F.3
-
20
-
-
38149111147
-
Batch pairing delegation
-
In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Springer, Heidelberg
-
Tsang, P.P., Chow, S.S.M., Smith, S.W.: Batch Pairing Delegation. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 74-90. Springer, Heidelberg (2007)
-
(2007)
IWSEC 2007. LNCS
, vol.4752
, pp. 74-90
-
-
Tsang, P.P.1
Chow, S.S.M.2
Smith, S.W.3
-
21
-
-
84903648405
-
Delegating a pairing can be both secure and efficient
-
In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) Springer, Heidelberg
-
Canard, S., Devigne, J., Sanders, O.: Delegating a Pairing Can Be Both Secure and Efficient. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 549-565. Springer, Heidelberg (2014)
-
(2014)
ACNS 2014. LNCS
, vol.8479
, pp. 549-565
-
-
Canard, S.1
Devigne, J.2
Sanders, O.3
-
22
-
-
84883521480
-
Delegation of computation with verification outsourcing: Curious verifiers
-
ACM, New York
-
Xu, G., Amariucai, G., Guan, Y.: Delegation of Computation with Verification Outsourcing: Curious Verifiers. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 393-402. ACM, New York (2013)
-
(2013)
ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 393-402
-
-
Xu, G.1
Amariucai, G.2
Guan, Y.3
-
23
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
In: Rabin, T. (ed.) Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
24
-
-
85042713075
-
Secure outsourced garbled circuit evaluation for mobile devices
-
USENIX Association, Berkeley
-
Carter, H., Mood, B., Traynor, P., Butler, K.: Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. In: 22nd USENIX Conference on Security, pp. 289-304. USENIX Association, Berkeley (2013)
-
(2013)
22nd USENIX Conference on Security
, pp. 289-304
-
-
Carter, H.1
Mood, B.2
Traynor, P.3
Butler, K.4
-
25
-
-
84893690959
-
Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
-
In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) Springer, Heidelberg
-
Zhang, L.F., Safavi-Naini, R.: Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 329-348. Springer, Heidelberg (2013)
-
(2013)
CANS 2013. LNCS
, vol.8257
, pp. 329-348
-
-
Zhang, L.F.1
Safavi-Naini, R.2
-
26
-
-
84893597100
-
Computing encrypted cloud data efficiently under multiple keys
-
Wang, B., Li, M., Chow, S.S.M., Li, H.: Computing Encrypted Cloud Data Efficiently Under Multiple Keys. In: 4th IEEE Security and Privacy in Cloud Computing, co-located with IEEE Conference on Communications and Network Security (CNS), pp. 504-513 (2013)
-
(2013)
4th IEEE Security and Privacy in Cloud Computing, Co-located with IEEE Conference on Communications and Network Security (CNS)
, pp. 504-513
-
-
Wang, B.1
Li, M.2
Chow, S.S.M.3
Li, H.4
-
27
-
-
85159291851
-
A tale of two servers: Efficient privacy-preserving computation over cloud data under multiple keys
-
Wang, B., Li, M., Chow, S.S.M., Li, H.: A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys. In: 2nd IEEE Conference on Communications and Network Security, CNS (2014)
-
(2014)
2nd IEEE Conference on Communications and Network Security, CNS
-
-
Wang, B.1
Li, M.2
Chow, S.S.M.3
Li, H.4
-
28
-
-
79960885939
-
Two-party computation model for privacy-preserving queries over distributed databases
-
Chow, S.S.M., Lee, J.H., Subramanian, L.: Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. In: Network and Distributed System Security Symposium, NDSS (2009)
-
(2009)
Network and Distributed System Security Symposium, NDSS
-
-
Chow, S.S.M.1
Lee, J.H.2
Subramanian, L.3
-
29
-
-
0009268999
-
Distribution of modular sums and the security of the server aided exponentiation
-
Birkhauser, Basel
-
Nguyen, P., Shparlinski, I.E., Stern, J.: Distribution of Modular Sums and the Security of the Server Aided Exponentiation. In: Cryptography and Computational Number Theory. Progress in Computer Science and Applied Logic, vol. 20, pp. 331-342. Birkhauser, Basel (2001)
-
(2001)
Cryptography and Computational Number Theory. Progress in Computer Science and Applied Logic
, vol.20
, pp. 331-342
-
-
Nguyen, P.1
Shparlinski, I.E.2
Stern, J.3
-
30
-
-
84957610823
-
Speeding up discrete log and factoring based schemes via precomputations
-
In: Nyberg, K. (ed.) Springer, Heidelberg
-
Boyko, V., Peinado, M., Venkatesan, R.: Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221-235. Springer, Heidelberg (1998)
-
(1998)
Eurocrypt 1998. LNCS
, vol.1403
, pp. 221-235
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
31
-
-
23044435711
-
Short signatures from theweil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from theWeil Pairing. Journal of Cryptology 17(4), 297-319 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
|