共 14 条
- [1] Outsourcing the decryption of ABE ciphertexts. GREEN M,HOHENBERGER S,WATERS B. http://static.usenix.org/events/sec11/tech/full-papers/Green.pdf .
- [2] Verifiable delegation of computation over large datasets. BENABBAS S,GENNARO R,VAHLIS Y. CRYPTO 2011 . 2011
- [3] Publicly verifiable delegation of large polynomials and matrix computations with applications. FIORE D,GENNARO R. ACM CCS 2012 . 2012
- [4] Verifiable evaluation of private polynomials. MA X,ZHANG F,LI J. The Fourth International Conference on Emerging Intelligent Data and Web Technologies . 2013
- [5] Candidate multilinear maps from ideal lattices. GARG S,GENTRY C,HALEVI S. EUROCRYPT 2013 . 2013
- [6] Attribute-based encryption for circuits from multilinear maps. GARG S,GENTRY C,HALEVI S,SAHAI A,WATERS B. CRYPTO 2013 . 2013
- [7] Attributebased encryption with verifiable outsourced decryption. Lai Junzuo,Deng R,Guan Chaowen,et al. IEEE Trans on Information Forensics and Security . 2013
- [8] Improved delegation of computation using fully homomorphic encryption. CHUNG K M,KALAI Y,VADHAN S P. CRYPTO 2010 . 2010
- [9] From secrecy to soundness:efficient verification via secure computation. APPLEBAUM B,ISHAI Y,KUSHILEVITZ E. ICALP 2010 . 2010
- [10] How to delegate and verify in public:verifiable computation from attribute-based encryption. PARNO B,RAYKOVA M,VAIKUNTANATHAN V. TCC 2012 . 2012