{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:58Z","timestamp":1764997018887,"version":"3.40.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112022"},{"type":"electronic","value":"9783319112039"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11203-9_19","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T20:36:46Z","timestamp":1408048606000},"page":"326-343","source":"Crossref","is-referenced-by-count":61,"title":["Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage"],"prefix":"10.1007","author":[{"given":"Yujue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1145\/2590296.2590342","volume-title":"9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and Revoking Leaked Credentials: Accountability in Leaking Sensitive Outsourced Data. In: 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 425\u2013443. ACM, New York (2014)"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-Policy Hierarchical Attribute-Based Encryption with Short Ciphertexts. Information Sciences\u00a0275, 370\u2013384 (2014)","journal-title":"Information Sciences"},{"key":"19_CR3","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-319-11203-9_21","volume-title":"ESORICS 2014","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is touching my cloud. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol.\u00a08712, pp. 362\u2013379. Springer, Heidelberg (2014)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-24691-6_26","volume-title":"Information Security and Cryptology - ICISC 2003","author":"S.S.M. Chow","year":"2004","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 352\u2013369. Springer, Heidelberg (2004)"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s10586-013-0258-7","volume":"16","author":"B. Qin","year":"2013","unstructured":"Qin, B., Wang, H., Wu, Q., Liu, J., Domingo-Ferrer, J.: Simultaneous Authentication and Secrecy in Identity-Based Data Upload to Cloud. Cluster Computing\u00a016, 845\u2013859 (2013)","journal-title":"Cluster Computing"},{"key":"19_CR6","first-page":"598","volume-title":"14th ACM Conference on Computer and Communications Security (CCS)","author":"G. Ateniese","year":"2007","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: 14th ACM Conference on Computer and Communications Security (CCS), pp. 598\u2013609. ACM, New York (2007)"},{"key":"19_CR7","first-page":"584","volume-title":"14th ACM Conference on Computer and Communications Security (CCS)","author":"A. Juels","year":"2007","unstructured":"Juels, A., Kaliski Jr., B.S.: PoRs: Proofs of Retrievability for Large Files. In: 14th ACM Conference on Computer and Communications Security (CCS), pp. 584\u2013597. ACM, New York (2007)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing Shared Data on the Cloud via Security-Mediator. In: 33rd IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 124\u2013133 (2013)","DOI":"10.1109\/ICDCS.2013.60"},{"issue":"2","key":"19_CR10","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C. Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Transactions on Computers\u00a062(2), 362\u2013375 (2013)","journal-title":"IEEE Transactions on Computers"},{"key":"19_CR11","first-page":"19","volume-title":"International Workshop on Security in Cloud Computing","author":"J. Yuan","year":"2013","unstructured":"Yuan, J., Yu, S.: Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud. In: International Workshop on Security in Cloud Computing, pp. 19\u201326. ACM, New York (2013)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","volume-title":"Theory of Cryptography","author":"S. Hohenberger","year":"2005","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 264\u2013282. Springer, Heidelberg (2005)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-642-33167-1_31","volume-title":"Computer Security \u2013 ESORICS 2012","author":"X. Chen","year":"2012","unstructured":"Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New Algorithms for Secure Outsourcing of Modular Exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 541\u2013556. Springer, Heidelberg (2012)"},{"issue":"2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10623-005-3710-8","volume":"39","author":"M. Dijk","year":"2006","unstructured":"Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding up Exponentiation using an Untrusted Computational Resource. Designs, Codes and Cryptography\u00a039(2), 253\u2013273 (2006)","journal-title":"Designs, Codes and Cryptography"},{"issue":"2","key":"19_CR15","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","volume":"8","author":"H. Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-Based Remote Data Possession Checking in Public Clouds. Information Security, IET\u00a08(2), 114\u2013121 (2014)","journal-title":"Information Security, IET"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"A. Kate","year":"2010","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-Size Commitments to Polynomials and Their Applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol.\u00a06477, pp. 177\u2013194. Springer, Heidelberg (2010)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-22792-9_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"S. Benabbas","year":"2011","unstructured":"Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable Delegation of Computation over Large Datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 111\u2013131. Springer, Heidelberg (2011)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., Tan, X., Chen, X., Wong, D.S.: An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 93\u201398 (2013)","DOI":"10.1109\/INCoS.2013.185"},{"issue":"4","key":"19_CR19","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/s10586-013-0252-0","volume":"16","author":"X. Ma","year":"2013","unstructured":"Ma, X., Li, J., Zhang, F.: Outsourcing Computation of Modular Exponentiations in Cloud Computing. Cluster Computing\u00a016(4), 787\u2013796 (2013)","journal-title":"Cluster Computing"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-75651-4_6","volume-title":"Advances in Information and Computer Security","author":"P.P. Tsang","year":"2007","unstructured":"Tsang, P.P., Chow, S.S.M., Smith, S.W.: Batch Pairing Delegation. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 74\u201390. Springer, Heidelberg (2007)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-3-319-07536-5_32","volume-title":"Applied Cryptography and Network Security","author":"S. Canard","year":"2014","unstructured":"Canard, S., Devigne, J., Sanders, O.: Delegating a Pairing Can Be Both Secure and Efficient. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol.\u00a08479, pp. 549\u2013565. Springer, Heidelberg (2014)"},{"key":"19_CR22","first-page":"393","volume-title":"ACM Symposium on Principles of Distributed Computing (PODC)","author":"G. Xu","year":"2013","unstructured":"Xu, G., Amariucai, G., Guan, Y.: Delegation of Computation with Verification Outsourcing: Curious Verifiers. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 393\u2013402. ACM, New York (2013)"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R. Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 465\u2013482. Springer, Heidelberg (2010)"},{"key":"19_CR24","first-page":"289","volume-title":"22nd USENIX Conference on Security","author":"H. Carter","year":"2013","unstructured":"Carter, H., Mood, B., Traynor, P., Butler, K.: Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. In: 22nd USENIX Conference on Security, pp. 289\u2013304. USENIX Association, Berkeley (2013)"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-02937-5_18","volume-title":"Cryptology and Network Security","author":"L.F. Zhang","year":"2013","unstructured":"Zhang, L.F., Safavi-Naini, R.: Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol.\u00a08257, pp. 329\u2013348. Springer, Heidelberg (2013)"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, M., Chow, S.S.M., Li, H.: Computing Encrypted Cloud Data Efficiently Under Multiple Keys. In: 4th IEEE Security and Privacy in Cloud Computing, co-located with IEEE Conference on Communications and Network Security (CNS), pp. 504\u2013513 (2013)","DOI":"10.1109\/CNS.2013.6682768"},{"key":"19_CR27","unstructured":"Wang, B., Li, M., Chow, S.S.M., Li, H.: A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys. In: 2nd IEEE Conference on Communications and Network Security, CNS (2014)"},{"key":"19_CR28","unstructured":"Chow, S.S.M., Lee, J.H., Subramanian, L.: Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. In: Network and Distributed System Security Symposium, NDSS (2009)"},{"key":"19_CR29","series-title":"Progress in Computer Science and Applied Logic","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-0348-8295-8_24","volume-title":"Cryptography and Computational Number Theory","author":"P. Nguyen","year":"2001","unstructured":"Nguyen, P., Shparlinski, I.E., Stern, J.: Distribution of Modular Sums and the Security of the Server Aided Exponentiation. In: Cryptography and Computational Number Theory. Progress in Computer Science and Applied Logic, vol.\u00a020, pp. 331\u2013342. Birkh\u00e4user, Basel (2001)"},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BFb0054129","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"V. Boyko","year":"1998","unstructured":"Boyko, V., Peinado, M., Venkatesan, R.: Speeding up Discrete Log and Factoring Based Schemes via Precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 221\u2013235. Springer, Heidelberg (1998)"},{"issue":"4","key":"19_CR31","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. Journal of Cryptology\u00a017(4), 297\u2013319 (2004)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2014"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11203-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:07:18Z","timestamp":1746338838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11203-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112022","9783319112039"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11203-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}