메뉴 건너뛰기




Volumn , Issue , 2013, Pages 55-64

On the (Im)possibility of privately outsourcing linear programming

Author keywords

cryptanalysis; linear programming; secure outsourcing

Indexed keywords

CRYPTANALYSIS; CRYPTOGRAPHIC METHODS; ENCRYPTION SYSTEM; LINEAR PROGRAMMING PROBLEM; PRIVACY PRESERVING; PROBLEM TRANSFORMATIONS; SECURITY DEFINITIONS; SOLVING ALGORITHM;

EID: 84889028611     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517488.2517490     Document Type: Conference Paper
Times cited : (11)

References (23)
  • 1
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • Dengguo Feng, David A. Basin, and Peng Liu, editors, ACM
    • Mikhail J. Atallah and Keith B. Frikken. Securely outsourcing linear algebra computations. In Dengguo Feng, David A. Basin, and Peng Liu, editors, ASIACCS, pages 48-59. ACM, 2010.
    • (2010) ASIACCS , pp. 48-59
    • Atallah, M.J.1    Frikken, K.B.2
  • 2
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • Mikhail J. Atallah and Jiangtao Li. Secure outsourcing of sequence comparisons. Int. J. Inf. Sec., 4(4):277-287, 2005.
    • (2005) Int. J. Inf. Sec. , vol.4 , Issue.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2
  • 6
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS, Springer
    • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, and Wenjing Lou. New algorithms for secure outsourcing of modular exponentiations. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS, volume 7459 of Lecture Notes in Computer Science, pages 541-556. Springer, 2012.
    • (2012) Lecture Notes in Computer Science , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 7
    • 84888986008 scopus 로고    scopus 로고
    • On securing untrusted clouds with cryptography
    • Yao Chen and Radu Sion. On securing untrusted clouds with cryptography. IEEE Data Eng. Bull., 35(4):9-20, 2012.
    • (2012) IEEE Data Eng. Bull. , vol.35 , Issue.4 , pp. 9-20
    • Chen, Y.1    Sion, R.2
  • 8
    • 84856170890 scopus 로고    scopus 로고
    • Practical privacy-preserving multiparty linear programming based on problem transformation
    • IEEE
    • Jannik Dreier and Florian Kerschbaum. Practical privacy-preserving multiparty linear programming based on problem transformation. In SocialCom/PASSAT, pages 916-924. IEEE, 2011.
    • (2011) SocialCom/PASSAT , pp. 916-924
    • Dreier, J.1    Kerschbaum, F.2
  • 10
    • 0242612156 scopus 로고    scopus 로고
    • A practical approach to solve secure multi-party computation problems
    • ACM Press
    • Wenliang Du and Zhijun Zhan. A practical approach to solve secure multi-party computation problems. In New Security Paradigms Workshop, pages 127-135. ACM Press, 2002.
    • (2002) New Security Paradigms Workshop , pp. 127-135
    • Du, W.1    Zhan, Z.2
  • 11
    • 38049029760 scopus 로고    scopus 로고
    • Encryption techniques for secure database outsourcing
    • Joachim Biskup and Javier Lopez, editors, ESORICS, Springer
    • Sergei Evdokimov and Oliver Günther. Encryption techniques for secure database outsourcing. In Joachim Biskup and Javier Lopez, editors, ESORICS, volume 4734 of Lecture Notes in Computer Science, pages 327-342. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4734 , pp. 327-342
    • Evdokimov, S.1    Günther, O.2
  • 12
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • Joe Kilian, editor, TCC, Springer
    • Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Joe Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 264-282. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 13
    • 84892885355 scopus 로고    scopus 로고
    • An inference-proof approach to privacy-preserving horizontally partitioned linear programs
    • To appear. Published online 05 October
    • Yuan Hong and Jaideep Vaidya. An inference-proof approach to privacy-preserving horizontally partitioned linear programs. Optimization Letters, 2013. To appear. Published online 05 October 2012.
    • (2012) Optimization Letters
    • Hong, Y.1    Vaidya, J.2
  • 14
    • 84872255959 scopus 로고    scopus 로고
    • Secure and efficient distributed linear programming
    • Yuan Hong, Jaideep Vaidya, and Haibing Lu. Secure and efficient distributed linear programming. Journal of Computer Security, 20(5):583-634, 2012.
    • (2012) Journal of Computer Security , vol.20 , Issue.5 , pp. 583-634
    • Hong, Y.1    Vaidya, J.2    Lu, H.3
  • 15
    • 84884724957 scopus 로고    scopus 로고
    • New Attacks against Transformation-Based Privacy-Preserving Linear Programming
    • Rafael Accorsi and Silvio Ranise, editors, Security and Trust Management (STM) 2013, 9th International Workshop, Springer
    • Peeter Laud and Alisa Pankova. New Attacks against Transformation-Based Privacy-Preserving Linear Programming. In Rafael Accorsi and Silvio Ranise, editors, Security and Trust Management (STM) 2013, 9th International Workshop, volume 8203 of Lecture Notes in Computer Science. Springer, 2013.
    • (2013) Lecture Notes in Computer Science , vol.8203
    • Laud, P.1    Pankova, A.2
  • 17
    • 84872266260 scopus 로고    scopus 로고
    • Privacy-preserving horizontally partitioned linear programs with inequality constraints
    • Wei Li, Haohao Li, and Chongyang Deng. Privacy-preserving horizontally partitioned linear programs with inequality constraints. Optimization Letters, 7(1):137-144, 2013.
    • (2013) Optimization Letters , vol.7 , Issue.1 , pp. 137-144
    • Li, W.1    Li, H.2    Deng, C.3
  • 18
    • 78650750065 scopus 로고    scopus 로고
    • Privacy-preserving linear programming
    • Olvi L. Mangasarian. Privacy-preserving linear programming. Optimization Letters, 5(1):165-172, 2011.
    • (2011) Optimization Letters , vol.5 , Issue.1 , pp. 165-172
    • Mangasarian, O.L.1
  • 19
    • 84857650296 scopus 로고    scopus 로고
    • Privacy-preserving horizontally partitioned linear programs
    • Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs. Optimization Letters, 6(3):431-436, 2012.
    • (2012) Optimization Letters , vol.6 , Issue.3 , pp. 431-436
    • Mangasarian, O.L.1
  • 20
    • 70350349546 scopus 로고    scopus 로고
    • Solving linear programs using multiparty computation
    • Roger Dingledine and Philippe Golle, editors, Berlin, Heidelberg, Springer-Verlag
    • Tomas Toft. Solving linear programs using multiparty computation. In Roger Dingledine and Philippe Golle, editors, Financial Cryptography and Data Security, pages 90-107, Berlin, Heidelberg, 2009. Springer-Verlag.
    • (2009) Financial Cryptography and Data Security , pp. 90-107
    • Toft, T.1
  • 21
    • 69249243704 scopus 로고    scopus 로고
    • Privacy-preserving linear programming
    • Sung Y. Shin and Sascha Ossowski, editors, ACM
    • Jaideep Vaidya. Privacy-preserving linear programming. In Sung Y. Shin and Sascha Ossowski, editors, SAC, pages 2002-2007. ACM, 2009.
    • (2009) SAC , pp. 2002-2007
    • Vaidya, J.1
  • 22
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • Cong Wang, Kui Ren, and Jia Wang. Secure and practical outsourcing of linear programming in cloud computing. In INFOCOM, 2011 Proceedings IEEE, pages 820-828, 2011.
    • (2011) INFOCOM, 2011 Proceedings IEEE , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 23
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • (extended abstract) IEEE
    • Andrew Chi-Chih Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164. IEEE, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.