Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
暂无分享,去创建一个
Fengjun Li | Chengliang Tian | Hanlin Zhang | Jia Yu | Shengxia Zhang | Hanlin Zhang | Chengliang Tian | Jia Yu | Fengjun Li | Shengxia Zhang
[1] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[2] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[3] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[4] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[5] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[6] François Le Gall,et al. Powers of tensors and fast matrix multiplication , 2014, ISSAC.
[7] David K. Smith. Theory of Linear and Integer Programming , 1987 .
[8] L. Tippett. Statistical Tables: For Biological, Agricultural and Medical Research , 1954 .
[9] Mikhail J. Atallah,et al. Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[10] Marina Blanton,et al. Practical Secure Computation Outsourcing , 2018, ACM Comput. Surv..
[11] Ming Xu,et al. A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud , 2017, SCC@AsiaCCS.
[12] Tao Jiang,et al. New publicly verifiable computation for batch matrix multiplication , 2019, Inf. Sci..
[13] Xuhui Chen,et al. Efficient secure outsourcing of large-scale linear systems of equations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[14] Tingwen Huang,et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..
[15] Payman Mohassel,et al. Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..
[16] R. McEliece. Finite Fields for Computer Scientists and Engineers , 1986 .
[17] Ravindranath Tagore,et al. PERMUTATION AND COMBINATIONS APPROACH TO PROGRAM EVALUATION AND REVIEW TECHNIQUE , 2007 .
[18] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.
[19] Refik Molva,et al. Efficient Techniques for Publicly Verifiable Delegation of Computation , 2016, AsiaCCS.
[20] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[21] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[22] Tingwen Huang,et al. Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.
[23] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[24] Rongxing Lu,et al. Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability , 2018, IEEE Internet of Things Journal.
[25] Peter J. Haas,et al. Large-scale matrix factorization with distributed stochastic gradient descent , 2011, KDD.
[26] R. A. Fisher,et al. Statistical Tables for Biological, Agricultural and Medical Research , 1956 .
[27] Phillip Barkan,et al. Kinematics and Dynamics of Planar Machinery , 1979 .
[28] G. Golub,et al. Some large-scale matrix computation problems , 1996 .
[29] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[30] Chengliang Tian,et al. How to securely outsource the inversion modulo a large composite number , 2017, J. Syst. Softw..
[31] Craig Gentry,et al. A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.
[32] B. Carpentieri. Sparse preconditioners for dense linear systems from electromagnetic applications , 2002 .
[33] Dennis S. Bernstein,et al. Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear Systems Theory , 2005 .
[34] Victor Y. Pan,et al. Efficient parallel solution of linear systems , 1985, STOC '85.
[35] Yihua Zhang,et al. Efficient Secure and Verifiable Outsourcing of Matrix Multiplications , 2014, ISC.
[36] Xuhui Chen,et al. A tutorial on secure outsourcing of large-scale computations for big data , 2016, IEEE Access.
[37] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[38] Ron M. Roth,et al. Introduction to Coding Theory , 2019, Discrete Mathematics.
[39] Yuan-Shun Dai,et al. Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[40] Xing Hu,et al. Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix , 2015, Journal of Cloud Computing.
[41] Charles R. Johnson,et al. Necessary And Sufficient Conditions For Existence of the LU Factorization of an Arbitrary Matrix , 2005 .
[42] Kurt Bryan,et al. The $25,000,000,000 Eigenvector: The Linear Algebra behind Google , 2006, SIAM Rev..
[43] Ronald L. Rivest,et al. Introduction to Algorithms, 3rd Edition , 2009 .
[44] Wei Gao,et al. MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication , 2016, NSS.
[45] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[46] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[47] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.