메뉴 건너뛰기




Volumn , Issue , 2011, Pages 549-558

Harnessing the cloud for securely solving large-scale systems of linear equations

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC PROPERTIES; AMAZON EC2; CHEATING DETECTION; COMPUTATIONAL RESOURCES; CONFIDENTIAL DATA; DIRECT METHOD; GAUSSIAN ELIMINATION; HIGH PROBABILITY; INPUT AND OUTPUTS; ITERATIVE APPROXIMATIONS; LU DECOMPOSITION; MATRIX-VECTOR; OUTSOURCE; PROTOTYPE EXPERIMENT; SECURITY ANALYSIS; SUCCESSIVE APPROXIMATIONS;

EID: 80051894689     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2011.41     Document Type: Conference Paper
Times cited : (65)

References (31)
  • 4
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry, "Computing arbitrary functions of encrypted data, " Commun. ACM, vol. 53, no. 3, pp. 97-105, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 5
    • 0029490594 scopus 로고
    • Solution of dense systems of linear equations arising from integral-equation formulations
    • K. Forsman, W. Gropp, L. Kettunen, D. Levine, and J. Salonen, "Solution of dense systems of linear equations arising from integral-equation formulations, " IEEE Antennas and Propagation Magazine, vol. 37, no. 6, pp. 96-100, 1995.
    • (1995) IEEE Antennas and Propagation Magazine , vol.37 , Issue.6 , pp. 96-100
    • Forsman, K.1    Gropp, W.2    Kettunen, L.3    Levine, D.4    Salonen, J.5
  • 6
    • 84973744454 scopus 로고
    • Large dense numerical linear algebra in 1993: The parallel computing influence
    • A. Edelman, "Large dense numerical linear algebra in 1993: The parallel computing influence, " International Journal of High Performance Computing Applications, vol. 7, no. 2, pp. 113-128, 1993.
    • (1993) International Journal of High Performance Computing Applications , vol.7 , Issue.2 , pp. 113-128
    • Edelman, A.1
  • 7
    • 0037023893 scopus 로고    scopus 로고
    • An efficient solution of a dense system of linear equations arising in the method-of-moments formulation
    • DOI 10.1002/mop.10274
    • V. Prakash, S. Kwon, and R. Mittra, "An efficient solution of a dense system of linear equations arising in the method-of-moments formulation, " Microwave and Optical Technology Letters, vol. 33, no. 3, pp. 196-200, 2002. (Pubitemid 34504486)
    • (2002) Microwave and Optical Technology Letters , vol.33 , Issue.3 , pp. 196-200
    • Prakash, V.V.S.1    Kwon, S.J.2    Mittra, R.3
  • 9
    • 84880872502 scopus 로고    scopus 로고
    • Secure Distributed Linear Algebra in a Constant Number of Rounds
    • Advances in Cryptology - CRYPTO 2001
    • R. Cramer and I. Damgård, "Secure distributed linear algebra in a constant number of rounds, " in Proc. of CRYPTO, 2001, pp. 119-136. (Pubitemid 33317911)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 119-136
    • Cramer, R.1    Damgard, I.2
  • 12
    • 52049092094 scopus 로고    scopus 로고
    • Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
    • P. Mohassel and E. Weinreb, "Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries, " in Proc. of CRYPTO, 2008, pp. 481-496.
    • (2008) Proc. of CRYPTO , pp. 481-496
    • Mohassel, P.1    Weinreb, E.2
  • 16
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. of EUROCRYPT, 1999, pp. 223-238.
    • (1999) Proc. of EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 17
    • 65749112026 scopus 로고    scopus 로고
    • Online at
    • Amazon.com, "Amazon elastic compute cloud, " Online at http://aws.amazon.com/ec2/, 2009.
    • (2009) Amazon Elastic Compute Cloud
  • 18
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Aug.
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Proc. of CRYPTO, Aug. 2010.
    • (2010) Proc. of CRYPTO
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 19
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. of ICDCS, 2010.
    • (2010) Proc. of ICDCS
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 20
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained access control in cloud computing, " in Proc. of INFOCOM, 2010.
    • (2010) Proc. of INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 23
  • 26
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C.-C. Yao, "Protocols for secure computations (extended abstract), " in Proc. of FOCS, 1982, pp. 160-164.
    • (1982) Proc. of FOCS , pp. 160-164
    • Yao, A.C.-C.1
  • 27
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc of STOC, 2009, pp. 169-178.
    • (2009) Proc of STOC , pp. 169-178
    • Gentry, C.1
  • 28
    • 77956778645 scopus 로고    scopus 로고
    • Secure outsourcing of scientific computations
    • Trends in Software Engineering
    • M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, "Secure outsourcing of scientific computations, " Advances in Computers, vol. 54, pp. 216-272, 2001. (Pubitemid 33319801)
    • (2001) Advances in Computers , vol.54 , pp. 216-272
    • Atallah, M.J.1    Pantazopoulos, K.N.2    Rice, J.R.3    Spafford, E.4
  • 30
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • M. Atallah and K. Frikken, "Securely outsourcing linear algebra computations, " in Proc. of ASIACCS, 2010, pp. 48-59.
    • (2010) Proc. of ASIACCS , pp. 48-59
    • Atallah, M.1    Frikken, K.2
  • 31
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing, " in Proc. of IEEE INFOCOM, 2011.
    • (2011) Proc. of IEEE INFOCOM
    • Wang, C.1    Ren, K.2    Wang, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.