2018
DOI: 10.1007/s10586-018-2830-7
|View full text |Cite
|
Sign up to set email alerts
|

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 41 publications
0
11
0
Order By: Relevance
“…In this section, we show verifiability issues for very recently proposed delegation schemes MExp and M2Exp proposed by Fu et al in cluster computing 11 under the OUP-assumption. We recall the original schemes MExp and M2Exp briefly before introducing the attacks to make the issues understandable for the readers.…”
Section: Verifiability Issues In Two Recent Delegation Schemesmentioning
confidence: 86%
See 3 more Smart Citations
“…In this section, we show verifiability issues for very recently proposed delegation schemes MExp and M2Exp proposed by Fu et al in cluster computing 11 under the OUP-assumption. We recall the original schemes MExp and M2Exp briefly before introducing the attacks to make the issues understandable for the readers.…”
Section: Verifiability Issues In Two Recent Delegation Schemesmentioning
confidence: 86%
“…This, however, annihilates the contribution regarding the full verifiability of M2Exp, actually M2Exp is totally unverifiable, that is, only 0-verifiable. Hence, for n > 1 and the claim regarding full verifiability [11] (Thm. 8, pp.…”
Section: And Outputs the Valuementioning
confidence: 88%
See 2 more Smart Citations
“…In 2018, Fu et al presented two schemes [33,34] and claimed that their verifiability are equal to one, but similar to Rangasamy's attack on Li's scheme, it can be shown that these scheme has a verifiability of zero. In 2018, Rangasamy [31] presented a scheme that, like Zhou's scheme, requires a covert computation modulus.…”
Section: Single-server Schemesmentioning
confidence: 99%