Page 251 - 《软件学报》2021年第12期
P. 251

周搏洋  等:全委托的公共可验证的外包数据库方案                                                         3915


          [7]    Chen Z, Chen L, Zhong H. Towards secure and verifiable database-driven spectrum sharing. In: Proc. of the 2017 47th Annual
             IEEE/IFIP Int’l Conf. on Dependable Systems and Networks (DSN). IEEE, 2017. 285−296.
          [8]    Wang Q, Zhou FC, Chen CY, et al. Secure collaborative publicly verifiable computation. IEEE Access, 2017,5(99):2479−2488.
          [9]    Zhang Y, Katz J, Papamanthou C. IntegriDB: Verifiable SQL for outsourced databases. In: Proc. of the 22nd ACM SIGSAC Conf.
             on Computer and Communications Security. 2015. 1480−1491.
         [10]    Zhang Z, Chen X, Li J,  et al.  HVDB:  A hierarchical verifiable database  scheme with scalable updates. Journal of  Ambient
             Intelligence and Humanized Computing, 2019,10(8):3045−3057.
         [11]    Kim KS, Jeong IR. Efficient verifiable data streaming. Security and Communication Networks, 2015,8(18):4013−4018.
         [12]    Guo Z, Li H, Cao C, et al. Verifiable algorithm for outsourced database with updating. Cluster Computing, 2019,22(3):5185−5193.
         [13]    Song W, Wang B, Wang Q, et al. Publicly verifiable computation of polynomials over outsourced data with multiple sources. IEEE
             Trans. on Information Forensics and Security, 2017,12(10):2334−2347.
         [14]    Chen X, Li H, Li J, et al. Publicly verifiable databases with all efficient updating operations. IEEE Trans. on Knowledge and Data
             Engineering, 2020.
         [15]    Miao M, Ma  J,  Huang X,  et al.  Efficient verifiable  databases  with insertion/deletion operations from  delegating polynomial
             functions. IEEE Trans. on Information Forensics and Security, 2017,13(2):511−520.
         [16]    Zhang A, Huang S, Wu X, et al. An effective verifiable database protocol in severe untrusted environment. In: Proc. of the 2018 5th
             IEEE Int’l Conf. on Cyber Security and Cloud Computing (CSCloud); 2018 4th IEEE Int’l Conf. on Edge Computing and Scalable
             Cloud (EdgeCom). IEEE, 2018. 5−11.
         [17]    Eltayesh F. Verifiable outsourced database model: A game-theoretic approach [MS. Thesis]. Montreal: Concordia University, 2017.
         [18]    Chen X, Li J, Huang X, et al. New publicly verifiable databases with efficient updates. IEEE Trans. on Dependable and Secure
             Computing, 2014,12(5):546−556.
         [19]    Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proc. of
             the Annual Cryptology Conf. Berlin, Heidelberg: Springe-Verlagr, 2010. 465−482.
         [20]    Su Y, Sun J,  Qin J,  et al. Publicly verifiable shared  dynamic  electronic health record databases  with  functional  commitment
             supporting privacy-preserving integrity auditing. IEEE Trans. on Cloud Computing, 2020.
         [21]    Backes M, Fiore D, Reischuk RM. Verifiable delegation of computation on outsourced data. In: Proc. of the ACM Sigsac Conf. on
             Computer & Communications Security. New York: ACM, 2013. 863−874.
         [22]    Wang Q, Xuan  PK, Wang HW,  et al.  A publicly verifiable outsourced database  scheme with  full operations. Journal of
             Northeastern University (Natural Science), 2018,39(8):1098−1102,1113 (in Chinese with English abstact).
         [23]    Wang JF, Chen XF, Sun SF, et al. Towards efficient verifiable conjunctive keyword search for large encrypted database. In: Proc.
             of the European Symp. on Research in Computer Security. Cham: Springer-Verlag, 2018.
         [24]    Miao M, Wang J, Wen S, et al. Publicly verifiable database scheme with efficient keyword search. Information Sciences, 2019,475:
             18−28.
         [25]    Chen CY. Research and implementation of verifiable outsourcing polynomial computation [MS. Thesis]. Shenyang: Northeastern
             University, 2017 (in Chinese with English abstact).
         [26]    Catalano D, Fiore  D.  Vector  commitments  and their  applications. In: Proc. of  the Int’l  Workshop on Public Key  Cryptography.
             Berlin, Heidelberg: Springer, 2013.
         [27]    Nguyen L. Accumulators from bilinear pairings and applications to ID-based ring signatures and group membership revocation. In:
             Proc. of the Topics in Cryptology-CT-RSA. 2005. 275−292.
         [28]    Au  MH, Tsang PP, Susilo W,  et al.  Dynamic universal  accumulators for DDH groups  and their  application to  attribute-based
             anonymous credential systems. In: Proc. of the Cryptographers’ Track at the RSA Conf. Berlin, Heidelberg: Springer-Verlag, 2009.
             295−308.
         [29]    Dan B, Boyen X. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 2008,
             21(2):149−177.
         [30]    Boneh D, Boyen X, Goh EJ. Hierarchical identity based encryption with constant size ciphertext. In: Proc. of the Annual Int’l Conf.
             on the Theory and Applications of Cryptographic Techniques. Berlin, Heidelberg: Springer-Verlag, 2005. 440−456.
   246   247   248   249   250   251   252   253   254   255   256