{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:40:08Z","timestamp":1730317208212,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"DOI":"10.1145\/2600075.2600085","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:18:31Z","timestamp":1401459511000},"page":"63-68","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On secure outsourcing of cryptographic computations to cloud"],"prefix":"10.1145","author":[{"given":"Lakshmi","family":"Kuppusamy","sequence":"first","affiliation":[{"name":"Society for Electronic Transactions and Security, Chennai, India"}]},{"given":"Jothi","family":"Rangasamy","sequence":"additional","affiliation":[{"name":"Society for Electronic Transactions and Security, Chennai, India"}]},{"given":"Praveen","family":"Gauravaram","sequence":"additional","affiliation":[{"name":"Tata Consultancy Services Limited, Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(89)90018-4"},{"key":"e_1_3_2_1_2_1","first-page":"86","volume-title":"M. Hutter and J.-M","author":"Aghili S.","year":"2013"},{"key":"e_1_3_2_1_3_1","unstructured":"AT&T Synaptic. Compute as a Service April 2014. https:\/\/www.synaptic.att.com\/clouduser\/html\/productdetail\/Compute_as_a_Service.htm. AT&T Synaptic. Compute as a Service April 2014. https:\/\/www.synaptic.att.com\/clouduser\/html\/productdetail\/Compute_as_a_Service.htm."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.12.001"},{"key":"e_1_3_2_1_5_1","first-page":"57","volume-title":"M. Hutter and J.-M","author":"Bagheri N.","year":"2013"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.021213.122837"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"D.\n \n Beaver\n and \n \n \n J.\n \n Feigenbaum\n \n \n . \n Hiding Instances in Multioracle Queries. In C. Choffrut and T. Lengauer editors Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90) volume \n 415\n of \n LNCS pages \n 37\n --\n 48\n . \n Springer 1990\n . D. Beaver and J. Feigenbaum. Hiding Instances in Multioracle Queries. In C. Choffrut and T. Lengauer editors Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90) volume 415 of LNCS pages 37--48. Springer 1990.","DOI":"10.1007\/3-540-52282-4_30"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"17","volume":"10","author":"Beaver D.","year":"1997","journal-title":"Locally Random Reductions: Improvements and Applications. J. Cryptology"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1346796.1346799"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D.\n \n Boneh C.\n \n Gentry B.\n \n Lynn and \n \n \n H.\n \n Shacham\n \n \n . \n Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In E. Biham editor Advances in Cryptology - EUROCRYPT\n \n 2003 volume \n 2656\n of \n LNCS pages \n 416\n --\n 432\n . \n Springer 2003. D. Boneh C. Gentry B. Lynn and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In E. Biham editor Advances in Cryptology - EUROCRYPT 2003 volume 2656 of LNCS pages 416--432. Springer 2003.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180432"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"D.\n \n Boneh\n and \n \n \n B.\n \n Waters\n \n \n . \n Conjunctive Subset and Range Queries on Encrypted Data. In S. P. Vadhan editor Theory of Cryptography (TCC) volume \n 4392\n of \n LNCS pages \n 535\n --\n 554\n . \n Springer 2007\n . D. Boneh and B. Waters. Conjunctive Subset and Range Queries on Encrypted Data. In S. P. Vadhan editor Theory of Cryptography (TCC) volume 4392 of LNCS pages 535--554. Springer 2007.","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"V.\n \n Boyko M.\n \n Peinado and \n \n \n R.\n \n Venkatesan\n \n \n . \n Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In K. Nyberg editor Advances in Cryptology -- Proc. EUROCRYPT '98 volume \n 1403\n of \n LNCS pages \n 221\n --\n 235\n . \n Springer 1998\n . V. Boyko M. Peinado and R. Venkatesan. Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In K. Nyberg editor Advances in Cryptology -- Proc. EUROCRYPT '98 volume 1403 of LNCS pages 221--235. Springer 1998.","DOI":"10.1007\/BFb0054129"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"D.\n \n Chaum\n and \n \n \n T. P.\n \n Pedersen\n \n \n . \n Wallet Databases with Observers. In E. F. Brickell editor Advances in Cryptology -Proc. CRYPTO '92 volume \n 740\n of \n LNCS pages \n 89\n --\n 105\n . \n Springer 1992\n . D. Chaum and T. P. Pedersen. Wallet Databases with Observers. In E. F. Brickell editor Advances in Cryptology -Proc. CRYPTO '92 volume 740 of LNCS pages 89--105. Springer 1992.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"X.\n \n Chen J.\n \n Li J.\n \n Ma Q.\n \n Tang and \n \n \n W.\n \n Lou\n \n \n . \n New Algorithms for Secure Outsourcing of Modular Exponentiations. In S. Foresti M. Yung and F. Martinelli editors Proc. 17th European Symposium on Research in Computer Security (ESORICS\n \n 2012\n ) volume \n 7459\n of \n LNCS pages \n 541\n --\n 556\n . \n Springer 2012. X. Chen J. Li J. Ma Q. Tang and W. Lou. New Algorithms for Secure Outsourcing of Modular Exponentiations. In S. Foresti M. Yung and F. Martinelli editors Proc. 17th European Symposium on Research in Computer Security (ESORICS 2012) volume 7459 of LNCS pages 541--556. Springer 2012.","DOI":"10.1007\/978-3-642-33167-1_31"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"e_1_3_2_1_20_1","first-page":"2024","author":"Das R.","year":"2014","journal-title":"RFID Forecasts, Players and Opportunities"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"P. de Rooij. On Schnorr's Preprocessing for Digital Signature Schemes. J. Cryptology 10(1):1--16 1997. P. de Rooij. On Schnorr's Preprocessing for Digital Signature Schemes. J. Cryptology 10(1):1--16 1997.","DOI":"10.1007\/s001459900016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"R.\n \n Gennaro C.\n \n Gentry and \n \n \n B.\n \n Parno\n \n \n . \n Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In T. Rabin editor Advances in Cryptology - Proc. CRYPTO\n \n 2010 volume \n 6223\n of \n LNCS pages \n 465\n --\n 482\n . \n Springer 2010. R. Gennaro C. Gentry and B. Parno. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In T. Rabin editor Advances in Cryptology - Proc. CRYPTO 2010 volume 6223 of LNCS pages 465--482. Springer 2010.","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"P.\n \n Golle\n and \n \n \n I.\n \n Mironov\n \n \n . \n Uncheatable Distributed Computations. In D. Naccache editor Topics in Cryptology - CT-RSA\n \n 2001 volume \n 2020\n of \n LNCS pages \n 425\n --\n 440\n . \n Springer 2001. P. Golle and I. Mironov. Uncheatable Distributed Computations. In D. Naccache editor Topics in Cryptology - CT-RSA 2001 volume 2020 of LNCS pages 425--440. Springer 2001.","DOI":"10.1007\/3-540-45353-9_31"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10628-6_17"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_22"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_15"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"A.\n \n Joux\n .\n \n \n \n A One Round Protocol for Tripartite Diffie-Hellman. In W. Bosma editor ANTS volume \n 1838\n of \n LNCS pages \n 385\n --\n 394\n . \n Springer 2000\n . A. Joux. A One Round Protocol for Tripartite Diffie-Hellman. In W. Bosma editor ANTS volume 1838 of LNCS pages 385--394. Springer 2000.","DOI":"10.1007\/10722028_23"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"T.\n \n Matsumoto K.\n \n Kato and \n \n \n H.\n \n Imai\n \n \n . \n Speeding Up Secret Computations with Insecure Auxiliary Devices. In S. Goldwasser editor Advances in Cryptology - Proc. CRYPTO '88 volume \n 403\n of \n LNCS pages \n 497\n --\n 506\n . \n Springer 1988\n . T. Matsumoto K. Kato and H. Imai. Speeding Up Secret Computations with Insecure Auxiliary Devices. In S. Goldwasser editor Advances in Cryptology - Proc. CRYPTO '88 volume 403 of LNCS pages 497--506. Springer 1988.","DOI":"10.1007\/0-387-34799-2_35"},{"key":"e_1_3_2_1_29_1","unstructured":"MIRACL. Multiprecision Integer and Rational Arithmetic C\/C+ Library. http:\/\/www.certivox.com\/miracl\/. MIRACL. Multiprecision Integer and Rational Arithmetic C\/C+ Library. http:\/\/www.certivox.com\/miracl\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-8295-8_24"},{"key":"e_1_3_2_1_31_1","series-title":"LNCS","first-page":"688","volume-title":"J.-J","author":"Schnorr C.-P.","year":"1990"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_33_1","first-page":"688","volume":"2013","author":"Scott M.","year":"2013","journal-title":"Print Archive"},{"key":"e_1_3_2_1_34_1","series-title":"LNCS","first-page":"47","volume-title":"Advances in Cryptology- Proc. CRYPTO '85","author":"Shamir A.","year":"1985"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 2nd international workshop on Security in cloud computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600075.2600085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T02:46:39Z","timestamp":1673145999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600075.2600085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":34,"alternative-id":["10.1145\/2600075.2600085","10.1145\/2600075"],"URL":"https:\/\/doi.org\/10.1145\/2600075.2600085","relation":{},"subject":[],"published":{"date-parts":[[2014,6,3]]},"assertion":[{"value":"2014-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}