Cryptology ePrint Archive: Report 2014/500
Available versions in chronological order
20140626:210810 (posted 26-Jun-2014 21:08:10 UTC)
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang, Chunming Tang.
20150307:220843 (posted 07-Mar-2015 22:08:43 UTC)
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang and Chunming Tang
[
Cryptology ePrint archive
]