Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y Xiang - computers & security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

Securely outsourcing attribute-based encryption with checkability

J Li, X Huang, J Li, X Chen… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly
enhances the versatility of access control mechanisms. Due to the high expressiveness of …

Identity-based encryption with outsourced revocation in cloud computing

J Li, J Li, X Chen, C Jia, W Lou - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Identity-Based Encryption (IBE) which simplifies the public key and certificate management
at Public Key Infrastructure (PKI) is an important alternative to public key encryption …

New algorithms for secure outsourcing of modular exponentiations

X Chen, J Li, J Ma, Q Tang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
With the rapid development of cloud services, the techniques for securely outsourcing the
prohibitively expensive computations to untrusted servers are getting more and more …

Verifiable computation over large database with incremental updates

X Chen, J Li, J Weng, J Ma… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …

New publicly verifiable databases with efficient updates

X Chen, J Li, X Huang, J Ma… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …

Secure and practical outsourcing of linear programming in cloud computing

C Wang, K Ren, J Wang - 2011 Proceedings Ieee Infocom, 2011 - ieeexplore.ieee.org
Cloud computing enables customers with limited computational resources to outsource
large-scale computational tasks to the cloud, where massive computational power can be …

New algorithms for secure outsourcing of large-scale systems of linear equations

X Chen, X Huang, J Li, J Ma, W Lou… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
With the rapid development in availability of cloud services, the techniques for securely
outsourcing the prohibitively expensive computations to untrusted servers are getting more …

Securely outsourcing linear algebra computations

MJ Atallah, KB Frikken - Proceedings of the 5th ACM Symposium on …, 2010 - dl.acm.org
We give improved protocols for the secure and private outsourcing of linear algebra
computations, that enable a client to securely outsource expensive algebraic computations …