BOOK-CHAPTER

Revocation in Publicly Verifiable Outsourced Computation

James AldermanChristian JansonCarlos CidJason Crampton

Year: 2015 Lecture notes in computer science Pages: 51-71   Publisher: Springer Science+Business Media
Keywords:
Computer science Outsourcing Server Verifiable secret sharing Revocation Computer security Key (lock) Cheating Service (business) Computation Encryption Public-key cryptography Cloud computing Key distribution Distributed computing Theoretical computer science Computer network Operating system Programming language Set (abstract data type) Overhead (engineering)

Metrics

12
Cited By
3.00
FWCI (Field Weighted Citation Impact)
12
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Verifiable Outsourced Computation

Rosario Gennaro

Year: 2017 Pages: 313-313
JOURNAL ARTICLE

Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication

Qiang WangY.-B. ChenFucai ZhouJian Xu

Journal:   IEEE Transactions on Emerging Topics in Computing Year: 2025 Vol: 13 (3)Pages: 1285-1298
JOURNAL ARTICLE

Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources

Wei SongBing WangQian WangChengliang ShiWenjing LouZhiyong Peng

Journal:   IEEE Transactions on Information Forensics and Security Year: 2017 Vol: 12 (10)Pages: 2334-2347
JOURNAL ARTICLE

Identity-Based Encryption with Verifiable Outsourced Revocation

Yanli RenNing DingXinpeng ZhangHaining LuDawu Gu

Journal:   The Computer Journal Year: 2016 Vol: 59 (11)Pages: 1659-1668
© 2026 ScienceGate Book Chapters — All rights reserved.