Twin Clouds: An Architecture for Secure Cloud Computing

作者: Sven Bugiel , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider

DOI:

关键词:

摘要:

参考文章(38)
Craig Gentry, Shai Halevi, Implementing Gentry's fully-homomorphic encryption scheme international cryptology conference. pp. 129- 148 ,(2011) , 10.1007/978-3-642-20465-4_9
Dan Boneh, Craig Gentry, A fully homomorphic encryption scheme Stanford University. ,(2009)
Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González, CryptoDSPs for cloud privacy web information systems engineering. pp. 428- 439 ,(2010) , 10.1007/978-3-642-24396-7_34
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Susan Hohenberger, Anna Lysyanskaya, How to Securely Outsource Cryptographic Computations Theory of Cryptography. pp. 264- 282 ,(2005) , 10.1007/978-3-540-30576-7_15
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider, Practical Secure Evaluation of Semi-private Functions Applied Cryptography and Network Security. pp. 89- 106 ,(2009) , 10.1007/978-3-642-01957-9_6
Reiner Sailer, Leendert van Doorn, Trent Jaeger, Xiaolan Zhang, Design and implementation of a TCG-based integrity measurement architecture usenix security symposium. pp. 16- 16 ,(2004)
Seny Kamara, Kristin Lauter, Cryptographic Cloud Storage Financial Cryptography and Data Security. ,vol. 6054, pp. 136- 149 ,(2010) , 10.1007/978-3-642-14992-4_13
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25