More efficient secure outsourcing methods for bilinear maps, Cryptology ePrint Archive, vol.960, 2015. ,
Updating key size estimations for pairings. Cryptology ePrint Archive, vol.334, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01534101
Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography, vol.42, issue.3, pp.239-271, 2007. ,
High-speed software implementation of the optimal ate pairing over barretonaehrig curves, Lecture Notes in Computer Science, vol.6487, pp.21-39, 2010. ,
, Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series, 2005.
Identity-based encryption from the weil pairing, Advances in Cryptology CRYPTO 2001, vol.2139, pp.213-229, 2001. ,
Short signatures from the weil pairing, Journal of Cryptology, vol.17, issue.4, pp.297-319, 2004. ,
Delegating a pairing can be both secure and efficient, Applied Cryptography and Network Security, vol.8479, pp.549-565, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01091145
Introduction to secure outsourcing computation, Synthesis Lectures on Information Security, Privacy, & Trust, vol.8, issue.2, pp.1-93, 2016. ,
Efficient algorithms for secure outsourcing of bilinear pairings, Theor. Comput. Sci, vol.562, pp.112-121, 2015. ,
Secure delegation of elliptic-curve pairing, Cryptology ePrint Archive, vol.150, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-01056101
Pairings for cryptographers, Discrete Appl. Math, vol.156, issue.16, pp.3113-3121, 2008. ,
The eta pairing revisited. Information Theory, IEEE Transactions on, vol.52, issue.10, pp.4595-4602, 2006. ,
How to securely outsource cryptographic computations, Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, vol.3378, pp.264-282, 2005. ,
A one round protocol for tripartite diffiehellman, Journal of Cryptology, vol.17, issue.4, pp.263-276, 2004. ,
, Efficient delegation of pairing computation, 2005.
Pairing-based cryptography at high security levels, Cryptography and Coding, vol.3796, pp.13-36, 2005. ,
A survey of computation offloading for mobile systems, Mobile Networks and Applications, vol.18, issue.1, pp.129-140, 2013. ,
New efficient and flexible algorithms for secure outsourcing of bilinear pairings, Cryptology ePrint Archive, 2016. ,
Securely outsourcing of bilinear pairings with untrusted servers for cloud storage, 2016. ,
The NIST Definition of Cloud Computing, NIST Special Publication, pp.800-145, 2011. ,
Distribution of modular sums and the security of the server aided exponentiation, 2000. ,
New algorithms for verifiable outsourcing of bilinear pairings, Science China Information Sciences, vol.59, issue.9, p.99103, 2016. ,
New Paradigms in Signature Schemes, 2006. ,
Secure bilinear pairing outsourcing made more efficient and flexible, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp.417-426, 2015. ,
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage, pp.326-343, 2014. ,