MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
暂无分享,去创建一个
Wei Gao | Ying Yin | Chunming Tang | Gang Sheng | Ying Yin | Gang Sheng | Chunming Tang | Wei Gao
[1] Tao Xiang,et al. Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..
[2] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[3] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[4] Xuhui Chen,et al. Efficient secure outsourcing of large-scale linear systems of equations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[5] Lu Li,et al. Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[6] Tingwen Huang,et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..
[7] Payman Mohassel,et al. Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..
[8] Chris Clifton,et al. Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.
[9] Xing Hu,et al. Veri able and secure outsourcing of matrix calculation and its application , 2013 .
[10] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[11] Jianfeng Wang,et al. Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.
[12] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[13] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[14] Yin Ying. Secure Scalar Product Computation of Vectors in Cloud Computing , 2013 .
[15] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.
[16] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.
[17] Hongwei Li,et al. Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications , 2014, GLOBECOM 2014.
[18] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[19] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[20] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[21] Tingwen Huang,et al. Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.
[22] Chunming Tang,et al. Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..
[23] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[24] Yuan-Shun Dai,et al. Enabling efficient publicly verifiable outsourcing computation for matrix multiplication , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).