Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix
暂无分享,去创建一个
[1] Zhinan Zhang,et al. The rank of a random matrix , 2007, Appl. Math. Comput..
[2] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[3] Ran Jin,et al. Efficient parallel spectral clustering algorithm design for large data sets under cloud computing environment , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[4] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[5] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[6] Yerzhan N. Seitkulov. New methods of secure outsourcing of scientific computations , 2012, The Journal of Supercomputing.
[7] Craig Gentry,et al. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness , 2010, CRYPTO.
[8] Sally I. McClean,et al. Cache performance models for quality of service compliance in storage clouds , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[9] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[10] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[11] G. Edward Suh,et al. Speeding up Exponentiation using an Untrusted Computational Resource , 2006, Des. Codes Cryptogr..
[12] Eike Kiltz,et al. Secure Linear Algebra Using Linearly Recurrent Sequences , 2007, Complexity of Boolean Functions.
[13] RegevOded,et al. On Ideal Lattices and Learning with Errors over Rings , 2013 .
[14] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[15] Xing Hu,et al. Veri able and secure outsourcing of matrix calculation and its application , 2013 .
[16] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[17] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[18] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[19] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[20] Cong Wang,et al. Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations , 2011, 2011 31st International Conference on Distributed Computing Systems.
[21] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[22] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[23] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[24] Payman Mohassel,et al. Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..
[25] David M. Nicol,et al. Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[26] Ron Steinfeld,et al. Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.
[27] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..