Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6725-7
Abstract: Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing…
read more here.
Keywords:
based signature;
signature scheme;
outsourced attribute;
verifiable outsourced ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2018.2861699
Abstract: A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a resource-constrained client to outsource expensive and sensitive workloads to computationally powerful but possibly untrusted service providers (called workers) and to verify the correctness of the results.…
read more here.
Keywords:
non interactive;
outsourced computation;
verifiable outsourced;
computation ... See more keywords