Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud

Background Related Works Our Works Background The proliferation of mobile devices,such as smart phones and netbooks,computationally weak devices which might off-load heavy computations to a cloud service provider.
Dawei Xie Haining Yang Jing Qin Jixin Ma
School of Mathematics,Shandong University
国内会议
第一届网络空间安全科学国际会议(The 1st International Conference on Science of Cyber Security-SciSec 2018)
北京
英文
1-25
2018-08-12(万方平台首次上网日期,不代表论文的发表时间)