Skip to main content
Log in

Efficient and secure outsourcing of bilinear pairings with single server

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl, 2011, 34: 1–11

    Article  Google Scholar 

  2. Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual International Cryptology Conference, Santa Barbara, 2010. 465–482

    MATH  Google Scholar 

  3. Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Proceedings of the 2nd Theory of Cryptography Conference, Cambridge, 2005. 264–282

    MATH  Google Scholar 

  4. Chen X F, Li J, Ma J F, et al. New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst, 2014, 25: 2386–2396

    Article  Google Scholar 

  5. Li J, Li J W, Chen X F, et al. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput, 2015, 64: 425–437

    Article  MathSciNet  MATH  Google Scholar 

  6. Chevallier B, Coron J, McCullagh N, et al. Secure delegation of elliptic-curve pairing. In: Proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, Passau, 2010. 24–35

    Google Scholar 

  7. Chen X F, SusiloW, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci, 2015, 562: 112–121

    Article  MathSciNet  MATH  Google Scholar 

  8. Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Security, Singapore, 2015. 417–426

    Google Scholar 

  9. Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings. Sci China Inf Sci, 2016, 59: 099103

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61572309).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanli Ren.

Additional information

The authors declare that they have no conflict of interest.

Supporting information Appendixes A–C. The supporting information is available online at info. scichina.com and link.springer.com. The supporting materials are published as submitted, without type-setting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dong, M., Ren, Y. Efficient and secure outsourcing of bilinear pairings with single server. Sci. China Inf. Sci. 61, 039104 (2018). https://doi.org/10.1007/s11432-017-9161-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9161-2

Navigation