BOOK-CHAPTER

Verifiable Computation on Outsourced Encrypted Data

Junzuo LaiRobert H. DengHweeHwa PangJian Weng

Year: 2014 Lecture notes in computer science Pages: 273-291   Publisher: Springer Science+Business Media
Keywords:
Homomorphic encryption Computer science Verifiable secret sharing Cloud computing Encryption Theoretical computer science Computation Computer security Homomorphic secret sharing Cryptography Secure multi-party computation Algorithm Operating system Programming language

Metrics

41
Cited By
6.46
FWCI (Field Weighted Citation Impact)
74
Refs
0.97
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Verifiable outsourced computation over encrypted data

Xixun YuZheng YanRui Zhang

Journal:   Information Sciences Year: 2018 Vol: 479 Pages: 372-385
JOURNAL ARTICLE

Verifiable Outsourced Computation

Rosario Gennaro

Year: 2017 Pages: 313-313
JOURNAL ARTICLE

Publicly Verifiable Boolean Query Over Outsourced Encrypted Data

Shunrong JiangXiaoyan ZhuLinke GuoJianqing Liu

Journal:   IEEE Transactions on Cloud Computing Year: 2017 Vol: 7 (3)Pages: 799-813
JOURNAL ARTICLE

Publicly Verifiable Boolean Query over Outsourced Encrypted Data

Shunrong JiangXiaoyan ZhuLinke GuoJianqing Liu

Journal:   2015 IEEE Global Communications Conference (GLOBECOM) Year: 2014 Vol: 2013 Pages: 1-6
JOURNAL ARTICLE

Verifiable Diversity Ranking Search Over Encrypted Outsourced Data

Yuling LiuHua PengJie Wang

Journal:   Cmc-computers Materials & Continua Year: 2018 Vol: 55 (1)Pages: 037-037
© 2026 ScienceGate Book Chapters — All rights reserved.