[1] CHAPMAN C, EMMERICH W, MARQUEZ F G, et al. Software Architecture Definition for On-demand Cloud Provisioning [J]. Cluster Computing, 2012, 15(2): 79-100.
[2] REN K, WANG C, WANG Q. Security Challenges for the Public Cloud [J]. IEEE Internet Computing, 2012, 16(1): 69-73.
[3] MEZGAR I, RAUSCHECKER U. The Challenge of Networked Enterprises for Cloud Computing Interoperability [J]. Computers in Industry, 2014, 65(4):657-674.
[4] GENNARO R, GENTRY C, PARNO B. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers[C]//Lecture Notes in Computer Science: 6223. Berlin: Springer, 2010: 465-482.
[5] 江明明, 胡予濮, 王保仓, 等. 格上的代理重签名方案[J]. 西安电子科技大学学报, 2014, 41(2): 20-24.
JIANG Mingming, HU Yupu, WANG Baocang, et al. Proxy Re-signature Scheme over the Lattice [J]. Journal of Xidian University, 2014, 41(2): 20-24.
[6] HOHENBERGER S, LYSYANSKAYA A. How to Securely Outsource Cryptographic Computations[C]//Lecture Notes in Computer Science: 3378. Berlin: Springer, 2005: 264-282.
[7] CHEN X, LI J, MA J, et al. New Algorithms for Secure Outsourcing of Modular Exponentiations [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(9), 2386-2396.
[8] WANG Y, WU Q, WONG D S, et al. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage[C]//The 19th European Symposium on Research in Computer Security. Berlin: Springer, 2014: 326-343.
[9] MA X, LI J, ZHANG F. Outsourcing Computation of Modular Exponentiations in Cloud Computing [J]. Cluster Computing, 2013, 16(4): 787-796.
[10] NGUYEN P Q, SHPARLINSKI I E, STERN J. Distribution of Modular Sums and the Security of the Server Aided Exponentiation[C]//Progress in Computer Science and Applied Logic: 20. Witzerland: Bikhauser Verlag AG, 2001: 331-342. |