Efficient and secure outsourcing of bilinear pairings with single server

Letter
  • 78 Downloads

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61572309).

Supplementary material

11432_2017_9161_MOESM1_ESM.pdf (74 kb)
Supplementary material, approximately 74 KB.

References

  1. 1.
    Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl, 2011, 34: 1–11CrossRefGoogle Scholar
  2. 2.
    Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual International Cryptology Conference, Santa Barbara, 2010. 465–482MATHGoogle Scholar
  3. 3.
    Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Proceedings of the 2nd Theory of Cryptography Conference, Cambridge, 2005. 264–282MATHGoogle Scholar
  4. 4.
    Chen X F, Li J, Ma J F, et al. New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst, 2014, 25: 2386–2396CrossRefGoogle Scholar
  5. 5.
    Li J, Li J W, Chen X F, et al. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput, 2015, 64: 425–437MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Chevallier B, Coron J, McCullagh N, et al. Secure delegation of elliptic-curve pairing. In: Proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, Passau, 2010. 24–35Google Scholar
  7. 7.
    Chen X F, SusiloW, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci, 2015, 562: 112–121MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Security, Singapore, 2015. 417–426Google Scholar
  9. 9.
    Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings. Sci China Inf Sci, 2016, 59: 099103CrossRefGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  1. 1.School of Communication and Information EngineeringShanghai UniversityShanghaiChina

Personalised recommendations