Author:
Wang Xu An,Liu Yudong,Sangaiah Arun Kumar,Zhang Jindan
Funder
National Cryptography Development Fund of China
National Nature Science Foundation of China
National Key Research and Development Program of China
Guangxi Key Laboratory of Cryptography and Information Security
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference31 articles.
1. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: CCS 07, pp 598–609
2. Boneh D, Freeman DM (2011) Homomorphic signatures for polynomial functions. In: Advances in cryptology-EUROCRYPT. Springer, pp 149–168
3. Catalano D, Fiore D (2013) Practical homomorphic macs forarithmetic circuits. In: Advances in cryptology-EUROCRYPT. Springer, pp 336–352
4. Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space-Based Situat Comput 4(2):77–87
5. Choi SG, Katz J, Kumaresan R, Cid C (2013) Multi-client non-interactive verifiable computation. In: Theory of cryptography. Springer, pp 499–518
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献