logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 039104(2018) https://doi.org/10.1007/s11432-017-9161-2

Efficient and secure outsourcing of bilinear pairings with single server

More info
  • ReceivedApr 13, 2017
  • AcceptedJun 21, 2017
  • PublishedSep 13, 2017

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant No. 61572309).


Supplement

Appendixes A–C.


References

[1] Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl, 2011, 34: 1--11. Google Scholar

[2] Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual International Cryptology Conference, Santa Barbara, 2010. 465--482. Google Scholar

[3] Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Proceedings of the 2nd Theory of Cryptography Conference, Cambridge, 2005. 264--282. Google Scholar

[4] Chen X F, Li J, Ma J F, et al. New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst, 2014, 25: 2386--2396. Google Scholar

[5] Li J, Li J W, Chen X F, et al. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput, 2015, 64: 425--437. Google Scholar

[6] Chevallier B, Coron J, McCullagh N, et al. Secure delegation of elliptic-curve pairing. In: Proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, Passau, 2010. 24--35. Google Scholar

[7] Chen X F, Susilo W, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci, 2015, 562: 112--121. Google Scholar

[8] Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Security, Singapore, 2015. 417--426. Google Scholar

[9] Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings. Sci China Inf Sci, 2016, 59: 099103. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1