LI Fu-xiang, HUO Jian-qiu, LIN Mu-qing, ZHOU Fu-cai. Bilinear Map-based Public Verifiable Outsourced Computation Scheme[J]. Journal of Northeastern University Natural Science, 2016, 37(5): 619-623.
[1]Green M,Hohenberger S,Waters B.Outsourcing the decryption of ABE ciphertexts[C]//Procceding of the 20th USENIX Cnference on Security.San Francisco,2011:34-34. [2]Chung K M,Kalai Y,Vadhan S.Improved delegation of computation using fully homomorphic encryption[M].Berlin:Springer,2010:483-501. [3]Anderson D P,Cobb J,Korpela E,et al.SETI@Home:an experiment in public-resource computing[J].Communications of the ACM, 2002,45(11):56-61. [4]Gennaro R,Gentry C,Parno B.Non-interactive verifiable computing:outsourcing computation to untrusted workers[M].Berlin:Springer,2010:465-482. [5]Yao A.Protocols for secure computations[C]//Procceding of the 23rd Annual Symposium on Foundations of Computer Science.New York,1982:160-164. [6]Gentry C.A fully homomorphic encryption scheme[D].Stanford:Stanford University,2009. [7]Barbosa M,Farshim P.Delegatable homomorphic encryption with applications to secure outsourcing of computation[M].Berlin:Springer,2012:296-312. [8]Goldwasser S,Kalai Y T,Rothblum G N.Delegating computation:interactive proofs for muggles[C]//Procceding of the 40th Annual ACM Symposium on Theory of Computing.Victoria,2008:113-122. [9]Bitansky N,Canetti R,Chiesa A,et al.From extractable collision resistance to succinct non-interactive arguments of knowledge,and back again[C]//Procceding of the 3rd Innovations in Theoretical Computer Science Conference.Cambridge,2012:326-349. [10]Parno B,Raykova M,Vaikuntanathan V.How to delegate and verify in public:verifiable computation from attribute-based encryption[M].Berlin:Springer,2012:422-439. [11]靳方元,朱艳琴,罗喜召.基于可验全同态加密的委托计算方案[J],计算机工程,2012,38(23):150-153.(Jin Fang-yuan,Zhu Yan-qin,Luo Xi-zhao.Delegation of computation scheme basedon verifiable fully homomorphic encryption[J].Computer Engineering,2012,38(23):150-153.) [12]Papamanthou C,Tamassia R,Triandopoulos N.Optimal verification of operations on dynamic sets[M]//Advances in Cryptology-CRYPTO 2011.Berlin:Springer,2011:91-110. [13]Canetti R,Paneth O,Papadopoulos D N.Triandopoulos,verifiable set operations over outsourced databases[M].Berlin:Springer,2014:113-130. [14]Zheng Q,Xu S.Verifiable delegated set intersection operations on outsourced encrypted data[C]//Procceding of the 2015 IEEE International Conference on Cloud Engineering(IC2E).Tempe,2015:175-184. [15]Kamara S,Mohassel P,Raykova M,et al.Scaling private set intersection to billion-element sets[M]//Financial Cryptography and Data Security.Berlin:Springer,2014:195-215.