International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

How to Securely Outsource Cryptographic Computations

Authors:
Susan Hohenberger
Anna Lysyanskaya
Download:
DOI: 10.1007/978-3-540-30576-7_15
URL: https://iacr.org/archive/tcc2005/3378_265/3378_265.pdf
Search ePrint
Search Google
Conference: TCC 2005
BibTeX
@inproceedings{tcc-2005-3678,
  title={How to Securely Outsource Cryptographic Computations},
  booktitle={Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={3378},
  pages={264-282},
  url={https://iacr.org/archive/tcc2005/3378_265/3378_265.pdf},
  doi={10.1007/978-3-540-30576-7_15},
  author={Susan Hohenberger and Anna Lysyanskaya},
  year=2005
}