WANG Qiang, XUAN Peng-kai, WANG Hong-wei, ZHOU Fu-cai. A Publicly Verifiable Outsourced Database Scheme with Full Operations[J]. Journal of Northeastern University Natural Science, 2018, 39(8): 1098-1103.
[1]Kellaris G,Kollios G,Nissim K,et al.Generic attacks on secure outsourced databases[C]// Proceedings of the Computer and Communications Security.[S.l.]:ACM,2016:1329-1340. [2]Song W,Wang B,Wang Q,et al.Tell me the truth:practically public authentication for outsourced databases with multi-user modification[J].Information Sciences,2017,387:221-237. [3]Cheng W,Pang H H,Tan K L.Authenticating multi-dimensional query results in data publishing[C]// IFIP Annual Conference on Data and Applications Security and Privacy.Berlin:Springer-Verlag,2006:60-73. [4]Niaz M S,Saake G.Merkle Hash Tree based techniques for data integrity of outsourced data[C/OL].[2017-01-23].https://pdfs.semanticscholar.org/5f8a/e87238e505aa03ea6130cdf74454d7347de9.pdf. [5]Miao M,Ma J,Huang X,et al.Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions[J].IEEE Transactions on Information Forensics and Security,2018,13(2):511-520. [6]Camenisch J,Kohlweiss M,Soriente C.An accumulator based on bilinear maps and efficient revocation for anonymous credentials[C]// Proceedings of the Public Key Cryptography.Irvine,2009:481-500. [7]Parno B,Howell J,Gentry C,et al.Pinocchio:nearly practical verifiable computation[C]// IEEE Symposium on Security & Privacy.New York:IEEE,2013:238-252. [8]Bensasson E,Chiesa A,Tromer E,et al.Succinct non-interactive zero knowledge for a von Neumann architecture[C]// Proceedings of the 23rd USENIX Security Symposium.San Diego,2014:781-796. [9]Bensasson E,Chiesa A,Genkin D,et al.SNARKs for C:verifying program executions succinctly and in zero knowledge[C]// Proceedings of the International Cryptology Conference.Washington DC,2013:90-108.