搜索结果: 1-9 共查到“军事学 Secure delegation”相关记录9条 . 查询时间(0.109 秒)
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
Verifiable and secure delegation bilinear maps cryptographic protocols
font style='font-size:12px;'>
2017/12/6
We address the problem of secure and verifiable delegation of general pairing computation. We first analyze some recently proposed pairing delegation schemes and present several attacks on their secur...
Efficient and Secure Delegation of Group Exponentiation to a Single Server
cryptographic protocols Single Server
font style='font-size:12px;'>
2016/1/3
We consider the problem of delegating computation of group operations from a computationally weaker client holding an input and a description of a function, to a {\em single} computationally stronger ...
Efficient and Secure Delegation of Linear Algebra
cryptographic protocols
font style='font-size:12px;'>
2012/6/14
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Efficient and Secure Delegation of Linear Algebra
cryptographic protocols
font style='font-size:12px;'>
2012/3/22
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Efficient and Secure Delegation of Linear Algebra
cryptographic protocols
font style='font-size:12px;'>
2012/3/21
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Authentication Proof of Retrievability Secure Cloud Storage
font style='font-size:12px;'>
2011/7/25
In cloud storage service, users upload their data together with authentication information to cloud storage server.
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
cryptographic protocols / Authentication Proof of Retrievability Secure Cloud Storage Secure Delegation of Auditing
font style='font-size:12px;'>
2012/3/28
In cloud storage service, users upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of users' data stored in the cloud storage,...
Provably Secure Delegation-by-Certification Proxy Signature Schemes
digital signature proxy signature bilinear map
font style='font-size:12px;'>
2009/3/27
In this paper, we first show that previous proxy signature schemes by delegation
with certificate are not provably secure under adaptive-chosen message
attacks and adaptive-chosen warrant attacks. T...
Secure Delegation of Elliptic-Curve Pairing
Elliptic-curve pairing secure delegation protocol Boneh-Franklin IBE
font style='font-size:12px;'>
2009/2/8
In this paper we describe a simple protocol for secure delegation of the
elliptic-curve pairing. A computationally limited device (typically a smart-card) will
delegate the computation of the pairi...