Dijk M, Clarke D, Gassend B, et al. Speeding up exponentiation using an untrusted computational resource[J]. Designs, Codes and Cryptography, 2006, 39(2): 253-273.
[2]
Hohenbergera S, Lysyanskaya A. How to securely outsource cryptographic computations[J]. LNCS, 2005, 3378: 264-282.
[3]
Atallah M J, Keith B. Frikken securely outsourcing linear algebra computations//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing: , 2010: 481-496.
[4]
Akimanaa R, Markowitch O, Roggeman Y. Secure outsourcing of DNA sequences comparisons in a grid environment [J]. WSEAS Transactions on Computers Research, 2007, 2(2): 262-269.
[5]
Atallah M J, Li Jiangtao. Secure outsourcing of sequence comparisons[J]. International Journal of Information Security, 2005, 4(4): 277-287.
[6]
Loureiro S, Bussard L, Roudier Y. Extending tamper-proof hardware security to untrusted execution environments//CARDIS’02: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference. Berkeley: , 2002: 12-19.
[7]
Biget P. How smartcards can benefit from Internet technologies to break memory constraints//1st Gemplus Developer Conference. Paris: , 1999.
[8]
Damgrd I, Ishai Y. Constant-round multiparty computation using a black-box pseudorandom generator//Advances in Cryptology (CRYPT0 05), volume LNCS 3621. : Springer-Verlag, 2005: 378-394.