Speeding
up Exponentiation using an Untrusted Computational Resource (Part 1)Author:
M. Van Dijk, D. Clarke, B. Gassend, G.E. Suh and S. DevadasSource:
Designs, Codes and Cryptography (IF:0.825), 39, 253-273,2006. (7 citations)Presenter:
Yu-Chi ChenOutline
- Introduction and model
- The protocols
- Conclusions
2
Introduction
spiderman
Compute gx
rely
HTC Desire HD
rely
Server
Untrusted Computational
Resource3
Introduction
Compute gx
HTC Desire HD
rely
Server
Untrusted Computational
ResourceCorrectness-checking
and get gx
4
Model
- Tim: