[1] Dijk M, Clarke D, Gassend B, et al. Speeding up exponentiation using an untrusted computational resource[J]. Designs, Codes and Cryptography, 2006, 39(2): 253-273. [2] Hohenbergera S, Lysyanskaya A. How to securely outsource cryptographic computations[J]. LNCS, 2005, 3378: 264-282. [3] Atallah M J, Keith B. Frikken securely outsourcing linear algebra computations//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing: , 2010: 481-496. [4] Akimanaa R, Markowitch O, Roggeman Y. Secure outsourcing of DNA sequences comparisons in a grid environment [J]. WSEAS Transactions on Computers Research, 2007, 2(2): 262-269. [5] Atallah M J, Li Jiangtao. Secure outsourcing of sequence comparisons[J]. International Journal of Information Security, 2005, 4(4): 277-287. [6] Loureiro S, Bussard L, Roudier Y. Extending tamper-proof hardware security to untrusted execution environments//CARDIS’02: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference. Berkeley: , 2002: 12-19. [7] Biget P. How smartcards can benefit from Internet technologies to break memory constraints//1st Gemplus Developer Conference. Paris: , 1999. [8] Damgrd I, Ishai Y. Constant-round multiparty computation using a black-box pseudorandom generator//Advances in Cryptology (CRYPT0 05), volume LNCS 3621. : Springer-Verlag, 2005: 378-394. [9] 马敏耀. 安全多方计算及其扩展问题的研究. 北京: 北京邮电大学图书馆, 2010. |