[1] |
GENNARO R , GENTRY C , PARNO B . Non-interactive verifiable computing:outsourcing computation to untrusted workers[A]. CRYPTO 2010[C]. 2010. 465-482.
|
[2] |
CHUNG K M , KALAI Y , VADHAN S P . Improved delegation of computation using fully homomorphic encryption[A]. CRYPTO 2010[C]. 2010. 483-501.
|
[3] |
APPLEBAUM B , ISHAI Y , KUSHILEVITZ E . From secrecy to soundness:efficient verification via secure computation[A]. ICALP 2010[C]. 2010. 152-163.
|
[4] |
PARNO B , RAYKOVA M , VAIKUNTANATHAN V . How to delegate and verify in public:verifiable computation from attribute-based encryption[A]. TCC 2012,LNCS 7194[C]. 2012. 422-439.
|
[5] |
CHOI S,KATZ J , KUMARESAN R , CID C . Multi-client non-interactive verifiable computation[A]. TCC 2013,LNCS 7785[C]. 2013. 499-518.
|
[6] |
CHEN X,LI J,MA J , TANG Q , LOU W . New algorithms for secure outsourcing of modular exponentiations[A]. ESORICS 2012,LNCS 7459[C]. 2012. 541-556.
|
[7] |
HOHENBERGER S , LYSYANSKAYA A .How to securely outsource cryptographic computations[A]. TCC 2005.LNCS 3378[C]. 2005. 264-282.
|
[8] |
ZHANG L , NAINI R S . Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps[A]. CANS 2013,LNCS 8257[C]. 2013. 329-348.
|
[9] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[EB/OL]. .
|
[10] |
LAI J,DENG R H , GUAN C , WENG J . Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013,8(8): 1343-1354.
|
[11] |
BENABBAS S , GENNARO R , VAHLIS Y . Verifiable delegation of computation over large datasets[A]. CRYPTO 2011,LNCS 6841[C]. 2011. 111-131.
|
[12] |
FIORE D , GENNARO R . Publicly verifiable delegation of large polynomials and matrix computations with applications[A]. ACM CCS 2012[C]. 2012. 501-512.
|
[13] |
MA X. , ZHANG F , LI J . Verifiable evaluation of private polynomials[A]. The Fourth International Conference on Emerging Intelligent Data and Web Technologies[C].IEEE CPS, 2013. 451-458.
|
[14] |
GARG S , GENTRY C , HALEVI S . Candidate multilinear maps from ideal lattices[A]. EUROCRYPT 2013,LNCS 7881[C]. 2013. 1-17.
|
[15] |
GARG S,GENTRY C,HALEVI S , SAHAI A , WATERS B . Attribute-based encryption for circuits from multilinear maps[A]. CRYPTO 2013,LNCS 8043[C]. 2013. 479-499.
|