메뉴 건너뛰기




Volumn 8783, Issue , 2014, Pages 158-178

Efficient secure and verifiable outsourcing of matrix multiplications

Author keywords

[No Author keywords available]

Indexed keywords

OUTSOURCING; SECURITY OF DATA; COSTS;

EID: 84921350434     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-13257-0_10     Document Type: Article
Times cited : (42)

References (34)
  • 1
    • 68849097857 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-based integrity for network coding
    • In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg
    • Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292–305. Springer, Heidelberg (2009)
    • (2009) ACNS 2009. LNCS , vol.5536 , pp. 292-305
    • Agrawal, S.1    Boneh, D.2
  • 2
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.), Springer, Heidelberg
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010, Part I. LNCS, vol. 6198, pp. 152–163. Springer, Heidelberg (2010)
    • (2010) ICALP 2010, Part I. LNCS , vol.6198 , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 3
    • 84921395160 scopus 로고    scopus 로고
    • Algorithms and Theory of Computation Handbook
    • ch. 17. CRC Press
    • Atallah, M., Blanton, M. (eds.): Algorithms and Theory of Computation Handbook. General Concepts and Techniques, vol. I, ch. 17. CRC Press (2009)
    • (2009) General Concepts and Techniques , vol.1
    • Atallah, M.1    Blanton, M.2
  • 4
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: ASIACCS, pp. 48–59 (2010)
    • (2010) ASIACCS , pp. 48-59
    • Atallah, M.1    Frikken, K.2
  • 5
    • 84867646569 scopus 로고    scopus 로고
    • Private outsourcing of matrix multiplication over closed semi-rings
    • Atallah, M., Frikken, K., Wang, S.: Private outsourcing of matrix multiplication over closed semi-rings. In: SECRYPT, pp. 136–144 (2012)
    • (2012) SECRYPT , pp. 136-144
    • Atallah, M.1    Frikken, K.2    Wang, S.3
  • 6
    • 84862599114 scopus 로고    scopus 로고
    • Rational proofs
    • Azar, P.D., Micali, S.: Rational proofs. In: STOC, pp. 1017–1028 (2012)
    • (2012) STOC , pp. 1017-1028
    • Azar, P.D.1    Micali, S.2
  • 7
    • 84893334389 scopus 로고    scopus 로고
    • Super efficient rational proofs
    • Azar, P.D., Micali, S.: Super efficient rational proofs. In: EC, pp. 29–30 (2013)
    • (2013) EC , pp. 29-30
    • Azar, P.D.1    Micali, S.2
  • 8
    • 0021980820 scopus 로고
    • Trading group theory for randomness
    • Babai, L.: Trading group theory for randomness. In: STOC, pp. 421–429 (1985)
    • (1985) STOC , pp. 421-429
    • Babai, L.1
  • 9
    • 84889045277 scopus 로고    scopus 로고
    • Verifiable delegation of computation on outsourced data
    • Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: CCS, pp. 863–874 (2013)
    • (2013) CCS , pp. 863-874
    • Backes, M.1    Fiore, D.2    Reischuk, R.M.3
  • 11
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • In: Kilian, J. (ed.), Springer, Heidelberg
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 12
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group diffie-hellman key exchange under standard assumptions
    • In: Knudsen, L.R. (ed.), Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group diffie-hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002. LNCS , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 13
    • 84873952327 scopus 로고    scopus 로고
    • Algebraic (trapdoor) one-way functions and their applications
    • In: Sahai, A. (ed.), Springer, Heidelberg
    • Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680–699. Springer, Heidelberg (2013)
    • (2013) TCC 2013. LNCS , vol.7785 , pp. 680-699
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Vamvourellis, K.4
  • 15
    • 80051994919 scopus 로고    scopus 로고
    • Memory delegation
    • In: Rogaway, P. (ed.), Springer, Heidelberg
    • Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151–168. Springer, Heidelberg (2011)
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 151-168
    • Chung, K.-M.1    Kalai, Y.T.2    Liu, F.-H.3    Raz, R.4
  • 16
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483–501. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 17
    • 84974555688 scopus 로고    scopus 로고
    • A cryptographic solution to a game theoretic problem
    • In: Bellare, M. (ed.), Springer, Heidelberg
    • Dodis, Y., Halevi, S., Rabin, T.: A cryptographic solution to a game theoretic problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 112–130. Springer, Heidelberg (2000)
    • (2000) CRYPTO 2000. LNCS , vol.1880 , pp. 112-130
    • Dodis, Y.1    Halevi, S.2    Rabin, T.3
  • 18
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: CCS, pp. 501–512 (2012)
    • (2012) CCS , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 19
    • 84893486709 scopus 로고    scopus 로고
    • Rational protocol design: Cryptography against incentive-driven adversaries
    • Garay, J., Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Rational protocol design: Cryptography against incentive-driven adversaries. In: FOCS, pp. 648–657 (2013)
    • (2013) FOCS , pp. 648-657
    • Garay, J.1    Katz, J.2    Maurer, U.3    Tackmann, B.4    Zikas, V.5
  • 20
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 21
    • 57049095424 scopus 로고    scopus 로고
    • Delegating computation: Interactive proofs for muggles
    • Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: Interactive proofs for muggles. In: STOC, pp. 113–122 (2008)
    • (2008) STOC , pp. 113-122
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 22
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186–208 (1989)
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 23
    • 84893284656 scopus 로고    scopus 로고
    • Rational arguments: Single round delegation with sublinear verification
    • Guo, S., Hubáček, S., Rosen, A., Vald, M.: Rational arguments: Single round delegation with sublinear verification. In: ITCS, pp. 523–540 (2014)
    • (2014) ITCS , pp. 523-540
    • Guo, S.1    Hubáček, S.2    Rosen, A.3    Vald, M.4
  • 24
    • 4544259607 scopus 로고    scopus 로고
    • Rational secret sharing and multiparty computation: Extended abstract
    • Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: Extended abstract. In: STOC, pp. 623–632 (2004)
    • (2004) STOC , pp. . 623-. 632
    • Halpern, J.1    Teague, V.2
  • 25
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • In: Preneel, B. (ed.), Springer, Heidelberg
    • Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
    • (2002) CT-RSA 2002. LNCS , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 26
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments (extended abstract)
    • Kilian, J.: A note on efficient zero-knowledge proofs and arguments (extended abstract). In: STOC, pp. 723–732 (1992)
    • (1992) STOC , pp. 723-732
    • Kilian, J.1
  • 27
    • 84957654400 scopus 로고
    • Improved efficient arguments (Preliminary version)
    • In: Coppersmith, D. (ed.), Springer, Heidelberg
    • Kilian, J.: Improved efficient arguments (Preliminary version). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 311–324. Springer, Heidelberg (1995)
    • (1995) CRYPTO 1995. LNCS , vol.963 , pp. 311-324
    • Kilian, J.1
  • 29
    • 0002597886 scopus 로고
    • CS proofs
    • Micali, S.: CS proofs. In: FOCS, pp. 436–453 (1994)
    • (1994) FOCS , pp. 436-453
    • Micali, S.1
  • 32
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012)
    • (2012) TCC 2012. LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 33
    • 84893690959 scopus 로고    scopus 로고
    • Private outsourcing of polynomial evaluation and matrixmultiplication usingmultilinear maps
    • Abdalla,M., Nita-Rotaru, C., Dahab, R. (eds.), Springer, Heidelberg
    • Zhang, L.F., Safavi-Naini, R.: Private outsourcing of polynomial evaluation and matrixmultiplication usingmultilinear maps. In: Abdalla,M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 329–348. Springer, Heidelberg (2013)
    • (2013) CANS 2013. LNCS , vol.8257 , pp. 329-348
    • Zhang, L.F.1    Safavi-Naini, R.2
  • 34
    • 84921395158 scopus 로고    scopus 로고
    • Efficient secure and verifiable outsourcing of matrix multiplications
    • Zhang, Y., Blanton, M.: Efficient secure and verifiable outsourcing of matrix multiplications. Cryptology ePrint Archive 2014/133 (2014)
    • (2014) Cryptology ePrint Archive 2014/133
    • Zhang, Y.1    Blanton, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.