Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server
暂无分享,去创建一个
[1] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[2] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[3] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[4] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[5] RattenVanessa. Cloud Computing Services , 2012 .
[6] Yihua Zhang,et al. Efficient Secure and Verifiable Outsourcing of Matrix Multiplications , 2014, ISC.
[7] B. Snaith,et al. Emergency ultrasound in the prehospital setting: the impact of environment on examination outcomes , 2011, Emergency Medicine Journal.
[8] Enav Weinreb,et al. Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries , 2008, CRYPTO.
[9] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[10] Xing Hu,et al. Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix , 2015, Journal of Cloud Computing.
[11] Tao Xiang,et al. Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..
[12] Yoji Yamato. Automatic verification technology of software patches for user virtual environments on IaaS cloud , 2015, Journal of Cloud Computing.
[13] Rajkumar Buyya,et al. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[14] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[15] Alptekin Küpçü,et al. Incentivizing outsourced computation , 2008, NetEcon '08.
[16] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[17] Jaideep Vaidya,et al. Secure and efficient distributed linear programming , 2012, J. Comput. Secur..
[18] Jung Hee Cheon,et al. Batch Fully Homomorphic Encryption over the Integers , 2013, EUROCRYPT.
[19] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[20] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[21] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[22] Ming-Syan Chen,et al. Privacy-preserving outsourcing support vector machines with random transformation , 2010, KDD.
[23] Carsten Lund,et al. Interactive Proof Systems and Alternating Time-Space Complexity , 1991, Theor. Comput. Sci..
[24] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[25] Yousef Saad,et al. Parallel Iterative Methods for Sparse Linear Systems , 2001 .
[26] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[27] Tingwen Huang,et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..
[28] Payman Mohassel,et al. Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..
[29] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[30] Peeter Laud,et al. Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers , 2015, IACR Cryptol. ePrint Arch..
[31] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[32] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[33] Cong Wang,et al. Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations , 2011, 2011 31st International Conference on Distributed Computing Systems.
[34] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[35] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[36] Lihua Liu,et al. Comment on “Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations” , 2016, IEEE Transactions on Parallel and Distributed Systems.
[37] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[38] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[39] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[40] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[41] Yihua Zhang,et al. Secure and Verifiable Outsourcing of Large-Scale Biometric Computations , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[42] Fabian Monrose,et al. Distributed Execution with Remote Audit , 1999, NDSS.
[43] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[44] Florian Kerschbaum,et al. Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[45] Tao Xiang,et al. Highly Efficient Linear Regression Outsourcing to a Cloud , 2014, IEEE Transactions on Cloud Computing.
[46] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.
[47] Ivan Damgård,et al. Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.
[48] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[49] Enav Weinreb,et al. Communication Efficient Secure Linear Algebra , 2006, TCC.
[50] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.