메뉴 건너뛰기




Volumn , Issue , 2015, Pages 44-50

Enabling efficient publicly verifiable outsourcing computation for matrix multiplication

Author keywords

Cloud computing; Matrix multiplication; Outsourcing computation; Publicly verifiable

Indexed keywords

CLOUD COMPUTING; DIGITAL STORAGE; IMAGE PROCESSING; OUTSOURCING; TELECOMMUNICATION NETWORKS;

EID: 84963766973     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ATNAC.2015.7366787     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 1
    • 71749113079 scopus 로고    scopus 로고
    • Identity-based authentication for cloud computing
    • Springer
    • H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in Cloud computing. Springer, 2009, pp. 157-166.
    • (2009) Cloud Computing , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 4
    • 84963735988 scopus 로고    scopus 로고
    • Design of computer vision and image processing technology based car keys tooth identification detection system
    • H. Y. Li, "Design of computer vision and image processing technology based car keys tooth identification detection system," in Advanced Materials Research, vol. 1079, 2015, pp. 1061-1063.
    • (2015) Advanced Materials Research , vol.1079 , pp. 1061-1063
    • Li, H.Y.1
  • 7
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Springer
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Advances in Cryptology-CRYPTO 2010. Springer, 2010, pp. 465-482.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 8
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations, with applications," in ACM conference on Computer and communications security. ACM, 2012, pp. 501-512.
    • (2012) ACM Conference on Computer and Communications Security. ACM , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 10
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • Springer
    • S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large datasets," in Advances in Cryptology-CRYPTO. Springer, 2011, pp. 111-131.
    • (2011) Advances in Cryptology-CRYPTO , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 11
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Springer
    • K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption," in Advances in Cryptology-CRYPTO. Springer, 2010, pp. 483-501.
    • (2010) Advances in Cryptology-CRYPTO , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 14
    • 84893690959 scopus 로고    scopus 로고
    • Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
    • Springer
    • L. F. Zhang and R. Safavi-Naini, "Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps," in Cryptology and Network Security. Springer, 2013, pp. 329-348.
    • (2013) Cryptology and Network Security , pp. 329-348
    • Zhang, L.F.1    Safavi-Naini, R.2
  • 16
    • 84921350434 scopus 로고    scopus 로고
    • Efficient secure and verifiable outsourcing of matrix multiplications
    • Springer
    • Y. Zhang and M. Blanton, "Efficient secure and verifiable outsourcing of matrix multiplications," in Information Security. Springer, 2014, pp. 158-178.
    • (2014) Information Security , pp. 158-178
    • Zhang, Y.1    Blanton, M.2
  • 17
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Springer
    • B. Parno, M. Raykova, and V. Vaikuntanathan, "How to delegate and verify in public: Verifiable computation from attribute-based encryption," in Theory of Cryptography. Springer, 2012, pp. 422-439.
    • (2012) Theory of Cryptography , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.