메뉴 건너뛰기




Volumn , Issue , 2014, Pages 591-596

Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming

Author keywords

Cloud computing; Data secrecy; Linear programming; Outsource secure algorithms

Indexed keywords

CLOUD COMPUTING; FINANCIAL DATA PROCESSING; INFORMATION MANAGEMENT; LINEAR PROGRAMMING; OUTSOURCING;

EID: 84903852537     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2014.147     Document Type: Conference Paper
Times cited : (21)

References (31)
  • 1
    • 34250257862 scopus 로고
    • Auxiliary problem principle and decomposition optimization problems
    • G. Cohen, Auxiliary problem principle and decomposition optimization problems, Journal of Optimizatin Theory and Appilications, 32(3), pp. 277-305, 1980.
    • (1980) Journal of Optimizatin Theory and Appilications , vol.32 , Issue.3 , pp. 277-305
    • Cohen, G.1
  • 3
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • M. Atallah and K. Frikken, Securely outsourcing linear algebra computations Proc. of ASIACCS, pp. 48-59, 2010.
    • (2010) Proc. of ASIACCS , pp. 48-59
    • Atallah, M.1    Frikken, K.2
  • 6
    • 45749113016 scopus 로고    scopus 로고
    • Improved conditional e-payments
    • LNCS 5037, Springer-Verlag
    • M. Blanton, Improved conditional e-payments, ACNS 2008, LNCS 5037, Springer-Verlag, pp. 188-206, 2008.
    • (2008) ACNS 2008 , pp. 188-206
    • Blanton, M.1
  • 7
    • 0001870201 scopus 로고    scopus 로고
    • Locally random reductions: Improvements and applications
    • D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, Locally random reductions: Improvements and applications, Journal of Cryptology, 10(1), pp. 17-36, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.1 , pp. 17-36
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 8
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • LNCS 6841, Springer-Verlag
    • S. Benabbas, R. Gennaro, and Y. Vahlis, Verifiable delegation of computation over large datasets, Advances in Cryptology-Crypto 2011, LNCS 6841, Springer-Verlag, pp. 111-131, 2011.
    • (2011) Advances in Cryptology-Crypto 2011 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 10
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • LNCS 7459 Springer-Verlag
    • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New algorithms for secure outsourcing of modular exponentiations, ESORICS 2012, LNCS 7459, pp. 541-556, Springer-Verlag, 2012.
    • (2012) ESORICS 2012 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 11
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • LNCS 740, Springer-Verlag
    • D. Chaum and T. Pedersen, Wallet databases with observers, Advances in Cryptology-Crypto 1992, LNCS 740, Springer-Verlag, pp. 89-105, 1993.
    • (1993) Advances in Cryptology-Crypto 1992 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 14
    • 84856186159 scopus 로고    scopus 로고
    • Practical secure and efficient multiparty linear programming based on problem transformation
    • ePrint Archive 2011/108
    • J. Dreier and F. Kerschbaum, Practical secure and efficient multiparty linear programming based on problem transformation. IACR Cryptology ePrint Archive 2011/108, 2011.
    • (2011) IACR Cryptology
    • Dreier, J.1    Kerschbaum, F.2
  • 15
    • 33646773954 scopus 로고    scopus 로고
    • Server-aided verification: Theory and practice
    • LNCS 3788, Springer-Verlag
    • M. Girault and D. Lefranc, Server-aided verification: theory and practice, Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer-Verlag, pp. 605-623, 2005.
    • (2005) Advances in Cryptology-ASIACRYPT 2005 , pp. 605-623
    • Girault, M.1    Lefranc, D.2
  • 16
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computations
    • LNCS 2020, Springer-Verlag
    • P. Golle, I. Mironov, Uncheatable distributed computations, CT-RSA 2001, LNCS 2020, Springer-Verlag, pp. 425-440, 2001
    • (2001) CT-RSA 2001 , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 18
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • LNCS 6223, Springer-Verlag
    • R. Gennaro, C. Gentry, and B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, Advances in Cryptology-Crypto 2010, LNCS 6223, Springer-Verlag, pp. 465-482, 2010.
    • (2010) Advances in Cryptology-Crypto 2010 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 19
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • LNCS 3378, Springer Verlag
    • S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations, TCC 2005, LNCS 3378, Springer Verlag, pp. 264-282, 2005.
    • (2005) TCC 2005 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 24
    • 33847420463 scopus 로고    scopus 로고
    • Conditional value at risk and related linear programming models for portfolio optimization
    • Springer
    • R. Mansini, W. Ogryczak, M.G. Speranza, Conditional value at risk and related linear programming models for portfolio optimization, Annals of Operations Research, 152(1), Springer, pp. 227-256, 2007.
    • (2007) Annals of Operations Research , vol.152 , Issue.1 , pp. 227-256
    • Mansini, R.1    Ogryczak, W.2    Speranza, M.G.3
  • 26
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • LNCS 7194, Springer-Verlag
    • B. Parno, M. Raykova and V Vaikuntanathan, How to delegate and verify in public: verifiable computation from attribute-based encryption, TCC 2012, LNCS 7194, Springer-Verlag, pp. 422-439, 2012.
    • (2012) TCC 2012 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 27
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • Springer-Verlag
    • C. P. Schnorr, Efficient signature generation for smart cards, Journal of Cryptology, 4(3), pp. 239-252, Springer-Verlag, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 28
    • 38549097531 scopus 로고    scopus 로고
    • Conditional E-cash
    • LNCS 4886, Springer-Verlag
    • L. Shi, B. Carbunar, and R. Sion, Conditional E-cash, FC 2007, LNCS 4886, Springer-Verlag, pp. 15-28, 2007.
    • (2007) FC 2007 , pp. 15-28
    • Shi, L.1    Carbunar, B.2    Sion, R.3
  • 29
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • C. Wang, K. Ren, J. Wang, and Qian Wang, Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations, IEEE Trans. Parallel Distribution Systems, 24(6), pp. 1172-1181, 2013.
    • (2013) IEEE Trans. Parallel Distribution Systems , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Ren, K.2    Wang, J.3    Wang, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.