4.8 Article

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server

Yanli Ren et al.

Summary: This paper introduces an efficient outsourcing algorithm of modular exponentiation based on two untrusted servers, which allows the outsourcer to detect errors with a probability of 1 based on Euler theorem. Additionally, an outsourcing algorithm of modular exponentiation with a single server is presented, which enables the outsourcer to check failures with a probability of 1. Experimental evaluations demonstrate that these proposed algorithms are the most efficient ones among all outsourcing algorithms for an outsourcer.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

Addressing Security and Privacy Issues of IoT Using Blockchain Technology

Bhabendu Kumar Mohanta et al.

Summary: The rapid growth of IoT technology presents security and privacy challenges, but blockchain technology offers some solutions. By integrating IoT and blockchain technologies, a more secure smart IoT system can be achieved.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain-based system for secure outsourcing of bilinear pairings

Chao Lin et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things

Hanlin Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

New publicly verifiable computation for batch matrix multiplication

Xiaoyu Zhang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Artificial Intelligence

A novel recurrent neural network and its finite-time solution to time-varying complex matrix inversion

Lin Xiao et al.

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing

Zhijun Wei et al.

IEEE ACCESS (2019)

Proceedings Paper Engineering, Electrical & Electronic

DecAuth: Decentralized Authentication Scheme for IoT Device Using Ethereum Blockchain

Bhabendu K. Mohanta et al.

PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY (2019)

Proceedings Paper Engineering, Electrical & Electronic

Study of Blockchain Based Decentralized Consensus Algorithms

Soumyashree S. Panda et al.

PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY (2019)

Letter Computer Science, Information Systems

Efficient and secure outsourcing of bilinear pairings with single server

Min Dong et al.

SCIENCE CHINA-INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

A Survey on the Edge Computing for the Internet of Things

Wei Yu et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing

Kai Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Jie Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Blockchains and Smart Contracts for the Internet of Things

Konstantinos Christidis et al.

IEEE ACCESS (2016)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Efficient algorithms for secure outsourcing of bilinear pairings

Xiaofeng Chen et al.

THEORETICAL COMPUTER SCIENCE (2015)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud

Fei Chen et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2014)

Article Computer Science, Theory & Methods

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

Cong Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Outsourcing Large Matrix Inversion Computation to A Public Cloud

Xinyu Lei et al.

IEEE Transactions on Cloud Computing (2013)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Computer Science, Hardware & Architecture

A View of Cloud Computing

Michael Armbrust et al.

COMMUNICATIONS OF THE ACM (2010)

Article Computer Science, Information Systems

A break in the clouds

Luis M. Vaquero et al.

ACM SIGCOMM Computer Communication Review (2009)