Author:
Aleksandrova E. B.,Shkorkina E. N.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference12 articles.
1. Hohenberger, S. and Lysyanskaya, A., How to securely outsource cryptographic computations, Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, 2005, pp. 264–282.
2. Chevallier-Mames, B., Coron, J, S., McCullagh, N., Naccache, D., and Scott, M., Secure delegation of elliptic-curve pairing, Cryptol. ePrint Arch., 2005, no. 150.
3. Kang, B.G., Lee, M.S., and Park, J.H., Efficient Delegation of Pairing Computation, 2005.
4. Canard, S., Devigne, J., and Sanders, O., Delegating a pairing can be both secure and efficient, in Applied Cryptography and Network Security: Lecture Notes in Computer Science, Springer International Publishing, 2014, pp. 549–565.
5. Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., and Tang, Q., Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci., 2015, vol. 562, pp. 112–121.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献