[1] GOLLE P, MIRONOV I. Uncheatable distributed computations[C] // CT-RSA 2001. Topics in Cryptiology-CT-RSA 2001, LNCS 2020, Berlin, German: Springer, 2001:425-440. [2] CARBUNAR B, TRIPUNITARA M. Conditional payments for computing markets[C] // CANS 2008. Cryptology and Network Security, LNCS 5339, Berlin, German: Springer, 2008:317-331. [3] CARBUNAR B, TRIPUNITARA M. Fair payments for outsourced computations[Z].IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks,Boston,Massachusetts,USA,Piscataway,2010. [4] SHI L, CARBUNAR B, SION R. Conditional e-Cash[C] // FC 2007. Financial Cryptography and Data Security, LNCS 4886, Berlin, German: Springer, 2007:15-28. [5] 张江霄,李舟军,高延武,等.基于花费链最优匿名的等长可传递电子现金系统[J].电子学报,43(9),1805-1809,2015.DOI: 10.3969/j.issn.0372-2112.2015.09.019. ZHANG J X, L I Z J, GAO Y W, et al. Transferable e-cash system of equal length with optimal anonymity based on spending chain[J]. Acta Electronica Sinica, 43(9), 1805-1809, 2015. DOI: 10.3969/j.issn.0372-2112.2015.09.019. [6] CHEN X F, LI J, SUSILO W. Efficient fair conditional payments for outsourcing computations[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6):1687-1694. DOI:10.1109/TIFS.2012.2210880. [7] GUILLEVIC A, VEGNAUD D. Algorithms for outsourcing pairing computation[C] // CARDIS 2014. Smart Card Research and Advanced Applications, LNCS 8968, Berlin, German: Springer, 2015: 193-211. [8] MA X, LI J, ZHANG F G. Outsourcing computation of modular exponentiations in cloud computing[J]. In Cluster Compute, 2013, 16(4):787-796.DOI:10.1007/s10586-013-0252-0. [9] 任艳丽,丁宁,王天银,等.可完全验证的双线性对运算外包算法[J].中国科学:信息科学,2016,46:855-869.DOI: 10.1360/N112016-00020. REN Y L, DING N, WANG T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings[J].Scientia Sinica Informationis, 2016,46:855-869.DOI: 10.1360/N112016-00020. [10] 李福祥,霍建秋,林慕清,等.基于双线性映射的公共可验证外包计算方案[J].东北大学学报(自然科学版),2016,37(5):619-623.DOI:1005-3026(2016)05-0619-05. LI F X, HUO J Q, LIN M Q, et al. Bilinear map-based public verifiable outsourced computation scheme[J]. Journal of Northeastern University(Natural Science), 2016, 37(5):619-623.DOI:1005-3026(2016)05-0619-05. [11] 韩益亮,陈飞,杨晓元.可验证的外包属性签名方案[J].密码学报,2017,4(2):151-164.DOI: 10.13868/j.cnki.jcr.000170. HAN Y L, CHEN F, YANG X Y. Verifiable outsourcing attribute-based signature scheme[J]. Journal of Cryptologic Research, 2017, 4(2):151-164.DOI: 10.13868/j.cnki.jcr.000170. [12] 陈振华,李顺东,黄琼,等.云外包计算中空间位置关系的保密判断[J].计算机学报,2017,40(2):351-363.DOI: 10.11897/SP.J.1016.2017.00351. CHEN Z H, LI S D, HUANG Q, et al. Privacy-preserving determination of spatial location-relation in cloud computing[J]. Chinese Journal of Computers, 2017, 40(2):351-363.DOI: 10.11897/SP.J.1016.2017.00351. [13] 张维纬,张育钊,黄焯,等.支持安全外包计算的无线体域网数据共享方案[J].通信学报,2017,38(4):64-75.DOI: 10.11959/j.issn.1000-436x.2017085. ZHANG W W, ZHANG Y Z, HUANG C, et al. Data sharing scheme supporting secure outsourced computation in wireless body area network[J]. Journal on Communications, 2017, 38(4):64-75.DOI: 10.11959/j.issn.1000-436x.2017085. [14] GROTH J, SAHAI A. Efficient Non-interactive proof systems for bilinear groups[C] // In EUROCRYPT 2008. Advances in Cryptology-EUROCRYPT 2008, LNCS 4968, Berlin, German: Springer, 2008:415-432. [15] FUCHSBAUER G. Commuting signatures and verifiable encryption[C] // CRYPTO 2011. Advances in Cryptology-EUROCRYPT 2011, LNCS 6632, Berlin, German: Springer, 2011:224-245. [16] ZHANG J X, GUO H, LI Z J, et al. Transferable conditional e-cash with optimal anonymity in the standard model[J]. IET Information Security,2015,9(1): 59-72. DOI:10.1049/iet-ifs.2013.0138. |