메뉴 건너뛰기




Volumn , Issue , 2014, Pages 572-577

Verifiable algorithm for secure outsourcing of systems of linear equations in the case of no solution

Author keywords

Cloud computing; Outsource secure computation; System of Linear Equations; Verification Techniques

Indexed keywords

ALGORITHMS; CLOUD COMPUTING; LARGE SCALE SYSTEMS; LINEAR EQUATIONS; LINEAR PROGRAMMING; MOBILE SECURITY; OUTSOURCING;

EID: 84946691392     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BWCCA.2014.117     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 5
    • 0036867930 scopus 로고    scopus 로고
    • Preconditioning techniques for large linear systems: A survey
    • M. Benzi, Preconditioning Techniques for Large Linear Systems: A Survey, Journal of Computational Physics, 182, pp. 418-477, 2002.
    • (2002) Journal of Computational Physics , vol.182 , pp. 418-477
    • Benzi, M.1
  • 10
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Springer-Verlag
    • X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, ESORICS 2012, LNCS 7459, pp. 541-556, Springer-Verlag, 2012.
    • (2012) ESORICS 2012, LNCS 7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 13
    • 84892393413 scopus 로고    scopus 로고
    • Fully homomorphic message authenticators
    • Springer, Heidelberg
    • R. Gennaro and D. Wichs, Fully Homomorphic Message Authenticators, Proc. of ASIACRYPT 2013, LNCS 8270, pp. 301-320. Springer, Heidelberg (2013).
    • (2013) Proc. of ASIACRYPT 2013, LNCS 8270 , pp. 301-320
    • Gennaro, R.1    Wichs, D.2
  • 15
    • 84937432284 scopus 로고    scopus 로고
    • Secure server-aided signature generation
    • M. Jakobsson and S. Wetzel, Secure Server-aided Signature Generation. PKC 2001, LNCS 1992, pp.383-401. 2001.
    • (2001) PKC 2001, LNCS 1992 , pp. 383-401
    • Jakobsson, M.1    Wetzel, S.2
  • 17
    • 77954051808 scopus 로고    scopus 로고
    • US Natl Inst. of Science and Technology
    • P. Mell and T. Grance, The NIST Definition of Cloud Computing, US Natl Inst. of Science and Technology, 2011; http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
    • (2011) The NIST Definition of Cloud Computing
    • Mell, P.1    Grance, T.2
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, Public-key Cryptosystems based on Composite Degree Residuosity Classes. Proc. of EUROCRYPT, 1999, pp. 223-238.
    • (1999) Proc. of EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 20
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • Jan.-Feb.
    • K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, v 16, n 1, pp. 69-73, Jan.-Feb. 2012.
    • (2012) IEEE Internet Computing , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 22
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • C. Wang, K. Ren, J. Wang, and Qian Wang, Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations, IEEE Trans. Parallel Distribution Systems, 24(6), pp. 1172-1181, 2013.
    • (2013) IEEE Trans. Parallel Distribution Systems , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Ren, K.2    Wang, J.3    Wang, Q.4
  • 23
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • A. Sahai, H. Seyalioglu, and B. Waters, Dynamic Credentials and Ciphertext Delegation for Attribute-based Encryption. CRYPTO 2012, LNCS 7417, pp. 199-217, 2012.
    • (2012) CRYPTO 2012, LNCS 7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.