Page 251 - 《软件学报》2021年第12期
P. 251
周搏洋 等:全委托的公共可验证的外包数据库方案 3915
[7] Chen Z, Chen L, Zhong H. Towards secure and verifiable database-driven spectrum sharing. In: Proc. of the 2017 47th Annual
IEEE/IFIP Int’l Conf. on Dependable Systems and Networks (DSN). IEEE, 2017. 285−296.
[8] Wang Q, Zhou FC, Chen CY, et al. Secure collaborative publicly verifiable computation. IEEE Access, 2017,5(99):2479−2488.
[9] Zhang Y, Katz J, Papamanthou C. IntegriDB: Verifiable SQL for outsourced databases. In: Proc. of the 22nd ACM SIGSAC Conf.
on Computer and Communications Security. 2015. 1480−1491.
[10] Zhang Z, Chen X, Li J, et al. HVDB: A hierarchical verifiable database scheme with scalable updates. Journal of Ambient
Intelligence and Humanized Computing, 2019,10(8):3045−3057.
[11] Kim KS, Jeong IR. Efficient verifiable data streaming. Security and Communication Networks, 2015,8(18):4013−4018.
[12] Guo Z, Li H, Cao C, et al. Verifiable algorithm for outsourced database with updating. Cluster Computing, 2019,22(3):5185−5193.
[13] Song W, Wang B, Wang Q, et al. Publicly verifiable computation of polynomials over outsourced data with multiple sources. IEEE
Trans. on Information Forensics and Security, 2017,12(10):2334−2347.
[14] Chen X, Li H, Li J, et al. Publicly verifiable databases with all efficient updating operations. IEEE Trans. on Knowledge and Data
Engineering, 2020.
[15] Miao M, Ma J, Huang X, et al. Efficient verifiable databases with insertion/deletion operations from delegating polynomial
functions. IEEE Trans. on Information Forensics and Security, 2017,13(2):511−520.
[16] Zhang A, Huang S, Wu X, et al. An effective verifiable database protocol in severe untrusted environment. In: Proc. of the 2018 5th
IEEE Int’l Conf. on Cyber Security and Cloud Computing (CSCloud); 2018 4th IEEE Int’l Conf. on Edge Computing and Scalable
Cloud (EdgeCom). IEEE, 2018. 5−11.
[17] Eltayesh F. Verifiable outsourced database model: A game-theoretic approach [MS. Thesis]. Montreal: Concordia University, 2017.
[18] Chen X, Li J, Huang X, et al. New publicly verifiable databases with efficient updates. IEEE Trans. on Dependable and Secure
Computing, 2014,12(5):546−556.
[19] Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proc. of
the Annual Cryptology Conf. Berlin, Heidelberg: Springe-Verlagr, 2010. 465−482.
[20] Su Y, Sun J, Qin J, et al. Publicly verifiable shared dynamic electronic health record databases with functional commitment
supporting privacy-preserving integrity auditing. IEEE Trans. on Cloud Computing, 2020.
[21] Backes M, Fiore D, Reischuk RM. Verifiable delegation of computation on outsourced data. In: Proc. of the ACM Sigsac Conf. on
Computer & Communications Security. New York: ACM, 2013. 863−874.
[22] Wang Q, Xuan PK, Wang HW, et al. A publicly verifiable outsourced database scheme with full operations. Journal of
Northeastern University (Natural Science), 2018,39(8):1098−1102,1113 (in Chinese with English abstact).
[23] Wang JF, Chen XF, Sun SF, et al. Towards efficient verifiable conjunctive keyword search for large encrypted database. In: Proc.
of the European Symp. on Research in Computer Security. Cham: Springer-Verlag, 2018.
[24] Miao M, Wang J, Wen S, et al. Publicly verifiable database scheme with efficient keyword search. Information Sciences, 2019,475:
18−28.
[25] Chen CY. Research and implementation of verifiable outsourcing polynomial computation [MS. Thesis]. Shenyang: Northeastern
University, 2017 (in Chinese with English abstact).
[26] Catalano D, Fiore D. Vector commitments and their applications. In: Proc. of the Int’l Workshop on Public Key Cryptography.
Berlin, Heidelberg: Springer, 2013.
[27] Nguyen L. Accumulators from bilinear pairings and applications to ID-based ring signatures and group membership revocation. In:
Proc. of the Topics in Cryptology-CT-RSA. 2005. 275−292.
[28] Au MH, Tsang PP, Susilo W, et al. Dynamic universal accumulators for DDH groups and their application to attribute-based
anonymous credential systems. In: Proc. of the Cryptographers’ Track at the RSA Conf. Berlin, Heidelberg: Springer-Verlag, 2009.
295−308.
[29] Dan B, Boyen X. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 2008,
21(2):149−177.
[30] Boneh D, Boyen X, Goh EJ. Hierarchical identity based encryption with constant size ciphertext. In: Proc. of the Annual Int’l Conf.
on the Theory and Applications of Cryptographic Techniques. Berlin, Heidelberg: Springer-Verlag, 2005. 440−456.