搜索结果: 1-9 共查到“军队指挥学 Secure delegation”相关记录9条 . 查询时间(0.046 秒)
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
Verifiable and secure delegation bilinear maps cryptographic protocols
2017/12/6
We address the problem of secure and verifiable delegation of general pairing computation. We first analyze some recently proposed pairing delegation schemes and present several attacks on their secur...
Efficient and Secure Delegation of Group Exponentiation to a Single Server
cryptographic protocols Single Server
2016/1/3
We consider the problem of delegating computation of group operations from a computationally weaker client holding an input and a description of a function, to a {\em single} computationally stronger ...
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Authentication Proof of Retrievability Secure Cloud Storage
2011/7/25
In cloud storage service, users upload their data together with authentication information to cloud storage server.
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
cryptographic protocols / Authentication Proof of Retrievability Secure Cloud Storage Secure Delegation of Auditing
2012/3/28
In cloud storage service, users upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of users' data stored in the cloud storage,...
Provably Secure Delegation-by-Certification Proxy Signature Schemes
digital signature proxy signature bilinear map
2009/3/27
In this paper, we first show that previous proxy signature schemes by delegation
with certificate are not provably secure under adaptive-chosen message
attacks and adaptive-chosen warrant attacks. T...
Secure Delegation of Elliptic-Curve Pairing
Elliptic-curve pairing secure delegation protocol Boneh-Franklin IBE
2009/2/8
In this paper we describe a simple protocol for secure delegation of the
elliptic-curve pairing. A computationally limited device (typically a smart-card) will
delegate the computation of the pairi...