메뉴 건너뛰기




Volumn 8712 LNCS, Issue PART 1, 2014, Pages 326-343

Securely outsourcing exponentiations with single untrusted program for cloud storage

Author keywords

cloud storage; modular exponentiation; offloading computation; provable Data Possession; verifiable computation

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84988269540     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11203-9_19     Document Type: Conference Paper
Times cited : (99)

References (31)
  • 2
    • 84900818518 scopus 로고    scopus 로고
    • Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    • Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-Policy Hierarchical Attribute-Based Encryption with Short Ciphertexts. Information Sciences 275, 370-384 (2014)
    • (2014) Information Sciences , vol.275 , pp. 370-384
    • Deng, H.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4    Zhang, L.5    Liu, J.6    Shi, W.7
  • 3
    • 84906504763 scopus 로고    scopus 로고
    • Who is touching my cloud
    • In: Kutylowski, M., Vaidya, J. (eds.) Springer, Heidelberg
    • Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is touching my cloud. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 362-379. Springer, Heidelberg (2014)
    • (2014) ESORICS 2014. LNCS , vol.8712 , pp. 362-379
    • Deng, H.1    Wu, Q.2    Qin, B.3    Mao, J.4    Liu, X.5    Zhang, L.6    Shi, W.7
  • 4
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity
    • In: Lim, J.-I., Lee, D.-H. (eds.) Springer, Heidelberg
    • Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
    • (2004) ICISC 2003. LNCS , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 5
    • 84888840097 scopus 로고    scopus 로고
    • Simultaneous authentication and secrecy in identity-based data upload to cloud
    • Qin, B., Wang, H., Wu, Q., Liu, J., Domingo-Ferrer, J.: Simultaneous Authentication and Secrecy in Identity-Based Data Upload to Cloud. Cluster Computing 16, 845-859 (2013)
    • (2013) Cluster Computing , vol.16 , pp. 845-859
    • Qin, B.1    Wang, H.2    Wu, Q.3    Liu, J.4    Domingo-Ferrer, J.5
  • 8
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • In: Pieprzyk, J. (ed.) Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) ASIACRYPT 2008. LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 11
    • 84878475706 scopus 로고    scopus 로고
    • Proofs of retrievability with public verifiability and constant communication cost in cloud
    • ACM, New York
    • Yuan, J., Yu, S.: Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud. In: International Workshop on Security in Cloud Computing, pp. 19-26. ACM, New York (2013)
    • (2013) International Workshop on Security in Cloud Computing , pp. 19-26
    • Yuan, J.1    Yu, S.2
  • 12
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • In: Kilian, J. (ed.) Springer, Heidelberg
    • Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005)
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 13
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • In: Foresti, S., Yung, M., Martinelli, F. (eds.) Springer, Heidelberg
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New Algorithms for Secure Outsourcing of Modular Exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
    • (2012) ESORICS 2012. LNCS , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 15
    • 84894562939 scopus 로고    scopus 로고
    • Identity-based remote data possession checking in public clouds
    • Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Remote Data Possession Checking in Public Clouds. Information Security, IET 8(2), 114-121 (2014)
    • (2014) Information Security , vol.IET 8 , Issue.2 , pp. 114-121
    • Wang, H.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4
  • 16
    • 78650828289 scopus 로고    scopus 로고
    • Constant-size commitments to polynomials and their applications
    • In: Abe, M. (ed.) Springer, Heidelberg
    • Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-Size Commitments to Polynomials and Their Applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177-194. Springer, Heidelberg (2010)
    • (2010) ASIACRYPT 2010. LNCS , vol.6477 , pp. 177-194
    • Kate, A.1    Zaverucha, G.M.2    Goldberg, I.3
  • 17
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • In: Rogaway, P. (ed.) Springer, Heidelberg
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable Delegation of Computation over Large Datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 19
    • 84888824020 scopus 로고    scopus 로고
    • Outsourcing computation of modular exponentiations in cloud computing
    • Ma, X., Li, J., Zhang, F.: Outsourcing Computation of Modular Exponentiations in Cloud Computing. Cluster Computing 16(4), 787-796 (2013)
    • (2013) Cluster Computing , vol.16 , Issue.4 , pp. 787-796
    • Ma, X.1    Li, J.2    Zhang, F.3
  • 20
    • 38149111147 scopus 로고    scopus 로고
    • Batch pairing delegation
    • In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Springer, Heidelberg
    • Tsang, P.P., Chow, S.S.M., Smith, S.W.: Batch Pairing Delegation. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 74-90. Springer, Heidelberg (2007)
    • (2007) IWSEC 2007. LNCS , vol.4752 , pp. 74-90
    • Tsang, P.P.1    Chow, S.S.M.2    Smith, S.W.3
  • 21
    • 84903648405 scopus 로고    scopus 로고
    • Delegating a pairing can be both secure and efficient
    • In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) Springer, Heidelberg
    • Canard, S., Devigne, J., Sanders, O.: Delegating a Pairing Can Be Both Secure and Efficient. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 549-565. Springer, Heidelberg (2014)
    • (2014) ACNS 2014. LNCS , vol.8479 , pp. 549-565
    • Canard, S.1    Devigne, J.2    Sanders, O.3
  • 23
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • In: Rabin, T. (ed.) Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 24
    • 85042713075 scopus 로고    scopus 로고
    • Secure outsourced garbled circuit evaluation for mobile devices
    • USENIX Association, Berkeley
    • Carter, H., Mood, B., Traynor, P., Butler, K.: Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. In: 22nd USENIX Conference on Security, pp. 289-304. USENIX Association, Berkeley (2013)
    • (2013) 22nd USENIX Conference on Security , pp. 289-304
    • Carter, H.1    Mood, B.2    Traynor, P.3    Butler, K.4
  • 25
    • 84893690959 scopus 로고    scopus 로고
    • Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
    • In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) Springer, Heidelberg
    • Zhang, L.F., Safavi-Naini, R.: Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 329-348. Springer, Heidelberg (2013)
    • (2013) CANS 2013. LNCS , vol.8257 , pp. 329-348
    • Zhang, L.F.1    Safavi-Naini, R.2
  • 30
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputations
    • In: Nyberg, K. (ed.) Springer, Heidelberg
    • Boyko, V., Peinado, M., Venkatesan, R.: Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221-235. Springer, Heidelberg (1998)
    • (1998) Eurocrypt 1998. LNCS , vol.1403 , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 31
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from theweil pairing
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from theWeil Pairing. Journal of Cryptology 17(4), 297-319 (2004)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.