{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:06Z","timestamp":1750220166317,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["HR001120C0156"],"award-info":[{"award-number":["HR001120C0156"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3560826.3563385","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T04:06:25Z","timestamp":1667534785000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and Applications"],"prefix":"10.1145","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[{"name":"Peraton Labs, Basking Ridge, NJ, USA"}]},{"given":"Matluba","family":"Khodjaeva","sequence":"additional","affiliation":[{"name":"CUNY John Jay College of Criminal Justice, New York, NJ, USA"}]},{"given":"Rajesh","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Peraton Labs, Basking Ridge, NJ, USA"}]},{"given":"David","family":"Shur","sequence":"additional","affiliation":[{"name":"Peraton Labs, Red Bank, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(89)90018-4"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of ACNS 2014","author":"Canard S.","year":"2014","unstructured":"S. Canard , J. Devigne , O. Sanders, Delegating a pairing can be both secure and efficient . In Proc. of ACNS 2014 , LNCS vol 8479. Springer 2014 . S. Canard, J. Devigne, O. Sanders, Delegating a pairing can be both secure and efficient. In Proc. of ACNS 2014, LNCS vol 8479. Springer 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_10"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"e_1_3_2_1_7_1","volume-title":"Prime numbers: A computational perspective","author":"Crandall R.","year":"2005","unstructured":"R. Crandall , C. Pomerance , Prime numbers: A computational perspective , 2 nd ed., Springer , 2005 . R. Crandall, C. Pomerance, Prime numbers: A computational perspective, 2nd ed., Springer, 2005.","edition":"2"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Quasilinear-time Clients. In 14th Int. Conf. on Security of Information and Networks (SIN)","author":"Crescenzo G. Di","year":"2021","unstructured":"G. Di Crescenzo , M. Khodjaeva , V. Shpilrain , D. Kahrobaei , R. Krishnan , Single- Server Delegation of Ring Multiplications from Quasilinear-time Clients. In 14th Int. Conf. on Security of Information and Networks (SIN) , 2021 , pp. 1 -- 8 . G. Di Crescenzo, M. Khodjaeva, V. Shpilrain, D. Kahrobaei, R. Krishnan, Single- Server Delegation of Ring Multiplications from Quasilinear-time Clients. In 14th Int. Conf. on Security of Information and Networks (SIN), 2021, pp. 1--8."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57808-4_3"},{"key":"e_1_3_2_1_10_1","volume-title":"Secure and Efficient Delegation of Pairings with Online Inputs. In: Proc. of CARDIS","volume":"12609","author":"Crescenzo G. Di","year":"2020","unstructured":"G. Di Crescenzo , M. Khodjaeva , D. Kahrobaei , V. Shpilrain , Secure and Efficient Delegation of Pairings with Online Inputs. In: Proc. of CARDIS 2020 . LNCS, vol. 12609 . Springer. G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, V. Shpilrain, Secure and Efficient Delegation of Pairings with Online Inputs. In: Proc. of CARDIS 2020. LNCS, vol. 12609. Springer."},{"key":"e_1_3_2_1_11_1","first-page":"17","volume-title":"Proc. of 9th ACM Cloud Computing Security Workshop (CCSW)","author":"Crescenzo G. Di","year":"2017","unstructured":"G. Di Crescenzo , M. Khodjaeva , D. Kahrobaei , V. Shpilrain , Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server . In: Proc. of 9th ACM Cloud Computing Security Workshop (CCSW) , pp. 17 -- 28 , 2017 . G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, V. Shpilrain, Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server. In: Proc. of 9th ACM Cloud Computing Security Workshop (CCSW), pp. 17--28, 2017."},{"volume-title":"Proc. of IEEE CNS 2019:  1--9.","author":"Crescenzo G. Di","key":"e_1_3_2_1_12_1","unstructured":"G. Di Crescenzo , M. Khodjaeva , D. Kahrobaei , V. Shpilrain , Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups , in Proc. of IEEE CNS 2019: 1--9. G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, V. Shpilrain, Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups, in Proc. of IEEE CNS 2019: 1--9."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11786-020-00462-4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-3710-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"volume-title":"Proc. of CRYPTO 1985:  477--488","author":"Feigenbaum J.","key":"e_1_3_2_1_16_1","unstructured":"J. Feigenbaum , Encrypting Problem Instances : Or ..., Can You Take Advantage of Someone Without Having to Trust Him? In Proc. of CRYPTO 1985: 477--488 . J. Feigenbaum, Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him? In Proc. of CRYPTO 1985: 477--488."},{"key":"e_1_3_2_1_17_1","first-page":"501","volume-title":"Proc. of ACM Conf. on Computer and Communications Security","author":"Fiore D.","year":"2012","unstructured":"D. Fiore , R. Gennaro, Publicly verifiable delegation of large polynomials and matrix computations, with applications . In Proc. of ACM Conf. on Computer and Communications Security 2012 , pp. 501 -- 512 . D. Fiore, R. Gennaro, Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proc. of ACM Conf. on Computer and Communications Security 2012, pp. 501--512."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2230462"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881445"},{"key":"e_1_3_2_1_20_1","first-page":"264","volume-title":"Proc. of TCC","author":"Hohenberger S.","year":"2005","unstructured":"S. Hohenberger , A. Lysyanskaya, How to securely outsource cryptographic computations . In Proc. of TCC 2005 , pp. 264 -- 282 , Springer. S. Hohenberger, A. Lysyanskaya, How to securely outsource cryptographic computations. In Proc. of TCC 2005, pp. 264--282, Springer."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/58562.214082"},{"key":"e_1_3_2_1_22_1","volume-title":"V. Shpilrain, A Survey on Delegated Computation. In: Proc. of 26th International Conference on Developments in Language Theory (DLT","volume":"13257","author":"Crescenzo G. Di","year":"2022","unstructured":"G. Di Crescenzo , M. Khodjaeva , D. Kahrobaei , V. Shpilrain, A Survey on Delegated Computation. In: Proc. of 26th International Conference on Developments in Language Theory (DLT 2022 ). LNCS, vol. 13257 . Springer. G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, V. Shpilrain, A Survey on Delegated Computation. In: Proc. of 26th International Conference on Developments in Language Theory (DLT 2022). LNCS, vol. 13257. Springer."},{"key":"e_1_3_2_1_23_1","first-page":"595","article-title":"of the USSR Academy of Sciences. 145: 293--294","volume":"7","author":"Karatsuba A.","year":"1963","unstructured":"A. Karatsuba , Y. Ofman , Multiplication of Many-Digital Numbers by Automatic Computers . In Proc . of the USSR Academy of Sciences. 145: 293--294 . Translation in Physics-Doklady , 7 ( 1963 ), pp. 595 -- 596 . A. Karatsuba, Y. Ofman, Multiplication of Many-Digital Numbers by Automatic Computers. In Proc. of the USSR Academy of Sciences. 145: 293--294. Translation in Physics-Doklady, 7 (1963), pp. 595--596.","journal-title":"Translation in Physics-Doklady"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.223880"},{"volume-title":"Proc. of IFIP\/SEC 2001: 77--92","author":"Markantonakis C.","key":"e_1_3_2_1_25_1","unstructured":"C. Markantonakis , Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? In Proc. of IFIP\/SEC 2001: 77--92 . C. Markantonakis, Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? In Proc. of IFIP\/SEC 2001: 77--92."},{"volume-title":"Speeding Up Secret Computations with Insecure Auxiliary Devices. In Proc. of CRYPTO 1988:  497--506","author":"Matsumoto T.","key":"e_1_3_2_1_26_1","unstructured":"T. Matsumoto , K. Kato , H. Imai , Speeding Up Secret Computations with Insecure Auxiliary Devices. In Proc. of CRYPTO 1988: 497--506 . T. Matsumoto, K. Kato, H. Imai, Speeding Up Secret Computations with Insecure Auxiliary Devices. In Proc. of CRYPTO 1988: 497--506."},{"key":"e_1_3_2_1_27_1","first-page":"1662","article-title":"In Mathematical and Computer Modelling, Volume 48","volume":"1646","author":"Ryan P.Y.A.","year":"2008","unstructured":"P.Y.A. Ryan , Pr\u00eat \u00e0 Voter with Paillier encryption. In Mathematical and Computer Modelling, Volume 48 , Issues 9--10 , 2008 , 1646 -- 1662 . P.Y.A. Ryan, Pr\u00eat \u00e0 Voter with Paillier encryption. In Mathematical and Computer Modelling, Volume 48, Issues 9--10, 2008, 1646--1662.","journal-title":"Issues 9--10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49669-2_9"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/268999.269003"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 4th Workshop on CPS &amp; IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560826.3563385","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560826.3563385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560826.3563385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":29,"alternative-id":["10.1145\/3560826.3563385","10.1145\/3560826"],"URL":"https:\/\/doi.org\/10.1145\/3560826.3563385","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}