logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 9: 099103(2016) https://doi.org/10.1007/s11432-016-5550-8

New algorithms for verifiable outsourcing of bilinear pairings

More info
  • ReceivedJun 5, 2015
  • AcceptedDec 29, 2015
  • PublishedAug 23, 2016

Abstract


Funded by

National Natural Science Foundation of China(61572309)

National Natural Science Foundation of China(61572246)

Plan for Scientific Innovation Talents HASTIT of Henan Province(13HASTIT042)

Doctoral Fund of Ministry of Education of China(20120073110094)

National Natural Science Foundation of China(61202367)

Innovation Program of Shanghai Municipal Education Commission(14YZ020)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. 61202367, 61572309, 61572246), Doctoral Fund of Ministry of Education of China (Grant No. 20120073110094), Innovation Program of Shanghai Municipal Education Commission (Grant No. 14YZ020), and Plan for Scientific Innovation Talents, HASTIT of Henan Province (Grant No. 13HASTIT042).


References

[1] Chen X F, Li J, Ma J F, et al. New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst, 2014, 25: 2386-2396 CrossRef Google Scholar

[2] Chevallier-Mames B, Coron J, McCullagh N, et al. Secure delegation of elliptic-curve pairing. In: Proceedings of 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, Passau, 2010. 24--35. Google Scholar

[3] Scott M, Costigan N, Abdulwahab W. Implementing cryptographic pairings on smartcards. In: Proceedings of 8th International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006. 134--147. Google Scholar

[4] Galbraith S, Paterson K, Smart N. Pairings for cryptographers. Discret Appl Math, 2008, 156: 3113-3121 CrossRef Google Scholar

[5] Tsang P, Chow S, Smith S. Batch pairing delegation. In: Proceedings of 2nd International Workshop on Security, Nara, 2007. 74--90. Google Scholar

[6] Chow S, Au M, Susilo W. Server-aided signatures verification secure against collusion attack. In: Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 401--405. Google Scholar

[7] Chen X F, Susilo W, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci, 2015, 562: 112-121 CrossRef Google Scholar

[8] Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of 10th ACM Symposium on Information, Computer and Communications Security, Singapore, 2015. 417--426. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1