{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T14:53:16Z","timestamp":1768575196315,"version":"3.49.0"},"reference-count":3,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2017,9]]},"abstract":"<jats:p> Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has been proposed to address this issue by allowing the computational result to be publicly verifiable. Observing that computational tasks are usually private business in practice, we propose a confidentiality-preserving security tool referred to as confidentiality-preserving publicly verifiable computation (CP-PVC), to efficiently address the scenario where a client would like to outsource a computational task to a cloud server but does not possess the input value locally. The CP-PVC allows the client to delegate the outsourcing computational task to anyone authorized and keeps the computational result confidential to anyone except the client, while not sacrificing the property of public verifiability. We propose a CP-PVC construction based on any one-key secure attribute-based encryption (ABE). Our construction is general as known ABE schemes are all one-key secure. Analysis shows that our CP-PVC scheme achieves computational result privacy without any significant extra cost and is almost as efficient as the up-to-date PVC schemes. These features render our CP-PVC as a practical and widely applicable tool to secure cloud computing. <\/jats:p>","DOI":"10.1142\/s0129054117400196","type":"journal-article","created":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T08:06:10Z","timestamp":1518077170000},"page":"799-818","source":"Crossref","is-referenced-by-count":7,"title":["Confidentiality-Preserving Publicly Verifiable Computation"],"prefix":"10.1142","volume":"28","author":[{"given":"Jiameng","family":"Sun","sequence":"first","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan, Shandong, P. R. China"}]},{"given":"Binrui","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan, Shandong, P. R. China"}]},{"given":"Jing","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan, Shandong, P. R. China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China"}]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, University of New South Wales Defence Force Academy, Canberra, Australia"}]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Beihang University, Beijing 100083, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2018,2,8]]},"reference":[{"key":"S0129054117400196BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.180"},{"key":"S0129054117400196BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363765"},{"key":"S0129054117400196BIB024","first-page":"51","volume-title":"Information Security and Cryptology","author":"Alderman J.","year":"2014"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054117400196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T20:48:29Z","timestamp":1565124509000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054117400196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":3,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2018,2,8]]},"published-print":{"date-parts":[[2017,9]]}},"alternative-id":["10.1142\/S0129054117400196"],"URL":"https:\/\/doi.org\/10.1142\/s0129054117400196","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}