References
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl, 2011, 34: 1–11
Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual International Cryptology Conference, Santa Barbara, 2010. 465–482
Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Proceedings of the 2nd Theory of Cryptography Conference, Cambridge, 2005. 264–282
Chen X F, Li J, Ma J F, et al. New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst, 2014, 25: 2386–2396
Li J, Li J W, Chen X F, et al. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput, 2015, 64: 425–437
Chevallier B, Coron J, McCullagh N, et al. Secure delegation of elliptic-curve pairing. In: Proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, Passau, 2010. 24–35
Chen X F, SusiloW, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci, 2015, 562: 112–121
Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Security, Singapore, 2015. 417–426
Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings. Sci China Inf Sci, 2016, 59: 099103
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 61572309).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Supporting information Appendixes A–C. The supporting information is available online at info. scichina.com and link.springer.com. The supporting materials are published as submitted, without type-setting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Dong, M., Ren, Y. Efficient and secure outsourcing of bilinear pairings with single server. Sci. China Inf. Sci. 61, 039104 (2018). https://doi.org/10.1007/s11432-017-9161-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9161-2