[1] ABO-ALIAN A,BADR N L,TOLBA M F.Data storage security service in cloud computing:challenges and solutions[M]//HASSANIEN A E,MOSTAFA F,MANAF M,et al.Multimedia forensics and security.Berlin,Germany:Springer,2017. [2] ZHANG Yuqing,WANG Xiaofei,LIU Xuefeng,et al.Survey on cloud computing security[J].Journal of Software,2016,27(6):1328-1348.(in Chinese)张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348. [3] PARNO B,RAYKOVA M,et al.How to delegate and verify in public:verifiable computation from attribute-based encryption[C]//Proceedings of TCC'12.New York,USA:ACM Press,2012:422-439. [4] APPLEBAUM B,ISHAI Y,KUSHILEVITZ E.From secrecy to soundness:efficient verification via secure computation[C]//Proceedings of International Colloquium Conference on Automata,Languages and Programming.Berlin,Germany:Springer,2010:152-163. [5] CHOI S,KATZ J,KUMARESAN R,et al.Multi-client non-interactive verifiable computation[C]//Proceedings of TCC'13.New York,USA:ACM Press,2013:499-518. [6] ZHANG Y,BLANTON M.Efficient secure and verifiable outsourcing of matrix multiplications[C]//Proceedings of International Conference on Information Security.Berlin,Germany:Springer,2014:158-178. [7] SUN Jiameng,ZHU Binrui,QIN Jing,et al.Confidentiality-preserving publicly verifiable computation[J].International Journal of Foundations of Computer Science,2018,28(6):799-818. [8] HOHENBERGER S,LYSYANSKAYA A.How to securely outsource cryptographic computations[C]//Proceedings of TCC'05.New York,USA:ACM Press,2005:264-282. [9] CHEN Xiaofeng,LI Jin,MA Jianfeng,et al.New algorithms for secure outsourcing of modular exponentiations[C]//Proceedings of ESORICS'12.Berlin,Germany:Springer,2012:541-556. [10] GENNARO R,GENTRY C,PARNO B.Non-interactive verifiable computing:outsourcing computation to untrusted workers[C]//Proceedings of CRYPTO'10.Berlin,Germany:Springer,2010:465-482. [11] BENABBAS S,GENNARO R,VAHLIS Y.Verifiable delegation of computation over large datasets[C]//Proceedings of CRYPTO'11.Berlin,Germany:Springer,2011:111-131. [12] JIN Fangyuan,ZHU Yanqin,LUO Xizhao.Delegation of computation scheme based on verifiable fully homomorphic encryption[J].Computer Engineering,2012,38(23):150-153.(in Chinese)靳方元,朱艳琴,罗喜召.基于可验全同态加密的委托计算方案[J].计算机工程,2012,38(23):150-153. [13] HALPEN J,TEAGUE V.Rational secret sharing and multiparty computation:extended abstract[C]//Proceedings of the 36th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,2004:623-632. [14] TIAN Youliang,PENG Changgen,LIN Dongdai,et al.Bayesian mechanism for rational secret sharing scheme[J].Science China Information Sciences,2015,58(5):1-13. [15] ZHAO Qingsong,XU Huanliang.Delegation computation based on re-randomizable garbled circuit[J].Computer Engineering,2013,39(12):136-140.(in Chinese)赵青松,徐焕良.基于随机化混淆电路的委托计算[J]. 计算机工程,2013,39(12):136-140. [16] LI Qiuxian,TIAN Youliang,WANG Zuan.Rational delegation computation protocol based on fully homomorphic encryption[J].Acta Electronica Sinica,2019,47(2):216-220.(in Chinese)李秋贤,田有亮,王缵.基于全同态加密的理性委托计算协议[J].电子学报,2019,47(2):216-220. [17] TIAN Youliang,LI Qiuxian,ZHANG Duo,et al.Provably secure rational delegation computation protocol[J].Journal on Communications,2019,40(7):135-143.(in Chinese)田有亮,李秋贤,张铎,等.可证明安全的理性委托计算协议[J].通信学报,2019,40(7):135-143. [18] WANG Ding,WANG Peng.Two birds with one stone:two-factor authentication with security beyond conventional bound[J].IEEE Transactions on Dependable and Secure Computing,2018,15(4):708-722. [19] CHUANG P J,LIAO Y P.Efficient and secure cross-realm client-to-client password-authenticated key exchange[C]//Proceedings of the 26th International Conference on Advanced Information Networking and Applications.Washington D.C.,USA:IEEE Press,2012:1-5. [20] WANG Ding,WANG Ping,WANG Chengyu.Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs[J].ACM Transactions on Cyber-Physical Systems,2019,4(3):1-5. [21] HE D B,KUMAR N,KHAN M K.Efficient privacy-aware authentication scheme for mobile cloud computing services[J].IEEE Systems Journal,2016,12(2):1621-1631. [22] GENTRY C.Fully homomorphic encryption using ideal lattice[C]//Proceedings of STOC'09.New York,ACM Press,2009:169-178. [23] KUPCU A.Incentivized outsourced computation resistant to malicious contractors[J].IEEE Transactions on Dependable & Secure Computing,2017,14(6):633-649. [24] CHEN X F,LI J,SUSILO W.Efficient fair conditional payments for outsourcing computations[J].IEEE Transactions on Information Forensics & Security,2012,7(6):1687-1694. [25] GENNARO R,GENTRY C,PARNO B.Non-interactive verifiable computing:outsourcing computation to untrusted workers[C]//Proceedings of CRYPTO'10.Berlin,Germany:Springer,2010:465-482. |