Login / Signup

Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud.

Qianqian SuRui ZhangRui Xue
Published in: Comput. J. (2020)
Keyphrases
  • third party
  • modular exponentiation
  • cloud computing
  • lightweight
  • secure communication