and Network Security. ACNS 2014. LNCS vol 8479.
Springer
B. Cavallo, G. Di Crescenzo, D. Kahrobaei, V. Shpilrain,
Efficient and secure delegation of group exponentia-
tion to a single server. In Proc. of RFIDSec 2015: pp.
156–173, LNCS, Springer.
X. Chen, W. Susilo, J. Li, D.S. Wong, J. Ma, S. Tang, and
Q. Tang, Efficient algorithms for secure outsourcing
of bilinear pairings. In Theor. Comput. Sci., vol. 562,
no. 9, pp. 112–121, 2015.
B. Chevallier-Mames, J.S. Coron, N. McCullagh, D.
Naccache, M. Scott: Secure delegation of elliptic-
curve pairing. Cryptology ePrint Archive. In Proc.
of Smart Card Research and Advanced Application.
CARDIS 2010. LNCS vol 6035. Springer. Also in
http://eprint.iacr.org/2005/150.
G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, V. Shpil-
rain, Secure and Efficient Delegation of Elliptic-Curve
Pairing. In: Proc. of ACNS 2020. LNCS, vol 12146.
Springer, Cham.
G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, V. Shpil-
rain, Secure and Efficient Delegation of Pairings with
Online Inputs. In: Proc. of CARDIS 2020. LNCS, vol.
12609. Springer.
G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, and V. Sh-
pilrain, Computing Multiple Exponentiations in Dis-
crete Log and RSA Groups: From Batch Verification
to Batch Delegation. In Proc. of 3rd IEEE Workshop
on Security and Privacy in the Cloud, IEEE, 2017.
G. Di Crescenzo, M. Khodjaeva, D. Kahrobaei, and V. Sh-
pilrain: A Survey on Delegated Computation. In Proc.
of DLT 2022: 33-53.
J. Feigenbaum, Encrypting Problem Instances: Or ..., Can
You Take Advantage of Someone Without Having to
Trust Him? In Proc. of CRYPTO 1985: 477-488.
R. Gennaro, C. Gentry, B. Parno, Non-interactive veri-
fiable computing: Outsourcing computation to un-
trusted workers. In Proc. of CRYPTO 2010, LNCS
6223, pp. 465–482.
M. Girault, D. Lefranc, Server-aided verification: Theory
and practice. In Roy, B.K. (ed.) ASIACRYPT 2005.
LNCS, vol. 3788, pp. 605–623.
A. Guillevic, D. Vergnaud, Algorithms for outsourcing pair-
ing computation. In Joye M., Moradi A. (eds) Smart
Card Research and Advanced Applications. CARDIS
2014. LNCS vol 8968. Springer.
S. Hohenberger, A. Lysyanskaya, How to securely out-
source cryptographic computations. In Proc. of TCC
2005, pp. 264–282, Springer.
A. Joux, A one round protocol for tripartite Diffie-Hellman,
in Proc. of ANTS IV, LNCS, vol. 1838, Springer,
2000, pp. 385–393.
E.J. Kachisa, E.F. Schaefer, M. Scott, Constructing Brezing-
Weng pairing friendly elliptic curves using elements in
the cyclotomic field. In Galbraith S.D., Paterson K.G.
(eds) Pairing-Based Cryptography – Pairing 2008.
LNCS vol. 5209. Springer.
B.G. Kang, M.S. Lee, J.H. Park, Efficient delegation of pair-
ing computation. In IACR Cryptology ePrint Archive,
n. 259, 2005.
O. Kalkar, I. Sertkaya, and S. Tutdere, On The Batch Out-
sourcing Of Pairing Computations, in: The Computer
Journal, 2022.
T. Kim, R. Barbulescu, Extended Tower Number Field
Sieve: A New Complexity for the Medium Prime Case.
In Proc. of CRYPTO (1) 2016, pp. 543–571, Springer.
T. Matsumoto, K. Kato, H. Imai, An improved algorithm
for secure outsourcing of modular exponentiations.
In Proc. of CRYPTO 1988, pp. 497–506, LNCS,
Springer.
D. Moody, R. Peralta, R. Perlner, A. Regenscheid, A. Ro-
ginsky, and L. Chen, Report on Pairing-based Cryp-
tography, in J. Res. Natl. Inst. Stand. Technol. 120:
11–27, 2015.
M. Scott, Unbalancing pairing-based key exchange pro-
tocols. In IACR Cryptology ePrint Archive, n. 688,
2013.
M. Scott, A note on group membership tests for G
1
, G
2
and
G
T
on BLS pairing-friendly curves. In IACR Cryptol-
ogy ePrint Archive, n. 1130, 2021.
R. Sakai, K. Ohgishi, andM. Kasahara, Cryptosystems
based on pairing, in Symposium on Cryptography and
Information Security (SCIS), 2000.
Z. Shan, K. Ren, M. Blanton, C. Wang, Practical Secure
Computation Outsourcing: A Survey. In ACM Com-
put. Surv. 51(2): 31:1-31:40, 2018.
P. Tsang, S. Chow, and S. Smith Batch pairing del-
egation. In: Proceedings of International Work-
shop on Security Nara, Japan, 29-31 October, 2007,
pp.74–90.Springer,Berlin.
F. Vercauteren, Optimal Pairings. In IEEE Transactions on
Information Theory, vol. 56, no. 1, pp. 455–461, Jan.
2010.
On Single-Server Delegation Without Precomputation
547