Secure outsource computing scheme of modular exponentiation based on single server
At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not...
Saved in:
Main Author: | Weijie DING |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-01-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018001/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
by: Rui SUN, et al.
Published: (2016-11-01) -
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
by: Xing-lan ZHANG, et al.
Published: (2017-06-01) -
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
by: Yinghui ZHANG, et al.
Published: (2024-02-01) -
Verifiably private outsourcing scheme for multivariate polynomial evaluation
by: Yan-li REN, et al.
Published: (2015-08-01) -
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
by: Ruizhong DU, et al.
Published: (2021-03-01)