Efficiently and securely harnessing cloud to solve linear regression and other matrix operations
暂无分享,去创建一个
[1] R. Raz,et al. How to delegate computations: the power of no-signaling proofs , 2014, Electron. Colloquium Comput. Complex..
[2] Jian Wang,et al. On efficiently harnessing cloud to securely solve linear regression and other matrix operations , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).
[3] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[4] Aniello Castiglione,et al. Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner , 2017, Comput. Secur..
[5] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[6] Fida Kamal Dankar,et al. Privacy Preserving Linear Regression on Distributed Databases , 2015, Trans. Data Priv..
[7] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[8] Joseph K. Liu,et al. A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing , 2014, IEEE Transactions on Information Forensics and Security.
[9] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[10] Tao Xiang,et al. Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..
[11] Jian Wang,et al. Efficient Encrypted Data Comparison Through a Hybrid Method , 2017, J. Inf. Sci. Eng..
[12] Geong Sen Poh,et al. Searchable Symmetric Encryption , 2017, ACM Comput. Surv..
[13] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[14] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[15] Han Liu,et al. Challenges of Big Data Analysis. , 2013, National science review.
[16] Bingru Yang,et al. Privacy preserving linear regression modeling of distributed databases , 2013, Optim. Lett..
[17] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[18] Martine De Cock,et al. Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data , 2015, AISec@CCS.
[19] Tao Xiang,et al. Highly Efficient Linear Regression Outsourcing to a Cloud , 2014, IEEE Transactions on Cloud Computing.
[20] Manuel Barbosa,et al. Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation , 2012, CT-RSA.
[21] Tsuyoshi Takagi,et al. Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..
[22] Lei Zhang,et al. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[23] S. Fienberg,et al. Secure multiple linear regression based on homomorphic encryption , 2011 .
[24] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[25] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[26] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.
[27] Cong Wang,et al. Proof-Carrying Cloud Computation: The Case of Convex Optimization , 2014 .
[28] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[29] Joseph K. Liu,et al. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.
[30] Tingwen Huang,et al. Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.
[31] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[32] Tingwen Huang,et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..
[33] Mingwu Zhang,et al. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification , 2018, IEEE Transactions on Dependable and Secure Computing.