메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Enabling efficient and secure outsourcing of large matrix multiplications

Author keywords

Cloud computing; Matrix multiplication; Outsourced computation; Privacy preserving; Verifiability

Indexed keywords

CLOUD STORAGE; MATRIX ALGEBRA; PRIVACY-PRESERVING TECHNIQUES; SENSITIVE DATA;

EID: 84964853019     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2014.7417184     Document Type: Conference Paper
Times cited : (21)

References (16)
  • 1
    • 71749113079 scopus 로고    scopus 로고
    • Identity-based authentication for cloud computing
    • H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing, " in Cloud computing. Springer, 2009, pp. 157-166.
    • (2009) Cloud Computing. Springer , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 2
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward secure and dependable storage services in cloud computing, " IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220-232, 2012.
    • (2012) IEEE Transactions on Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 4
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Springer
    • B. Parno, M. Raykova, and V. Vaikuntanathan, "How to delegate and verify in public: Verifiable computation from attribute-based encryption, " in Theory of Cryptography. Springer, 2012, pp. 422-439.
    • (2012) Theory of Cryptography. , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 5
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Springer
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Advances in Cryptology-CRYPTO. Springer, 2010, pp. 465-482.
    • (2010) Advances in Cryptology-CRYPTO , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 7
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations, with applications, " in ACM conference on Computer and communications security. ACM, 2012, pp. 501-512.
    • (2012) ACM Conference on Computer and Communications Security. ACM , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 8
    • 84893690959 scopus 로고    scopus 로고
    • Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
    • Springer
    • L. F. Zhang and R. Safavi-Naini, "Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps, " in Cryptology and Network Security. Springer, 2013, pp. 329-348.
    • (2013) Cryptology and Network Security , pp. 329-348
    • Zhang, L.F.1    Safavi-Naini, R.2
  • 9
  • 10
    • 84964824802 scopus 로고    scopus 로고
    • M. I. MIRACL and C. Rational Arithmetic
    • M. I. MIRACL and C. Rational Arithmetic, "C++ library. "
    • C++ Library.
  • 11
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Springer
    • K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption, " in Advances in Cryptology-CRYPTO. Springer, 2010, pp. 483-501.
    • (2010) Advances in Cryptology-CRYPTO , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 13
    • 84921350434 scopus 로고    scopus 로고
    • Efficient secure and verifiable outsourcing of matrix multiplications
    • Springer
    • Y. Zhang and M. Blanton, "Efficient secure and verifiable outsourcing of matrix multiplications, " in Information Security. Springer, 2014, pp. 158-178.
    • (2014) Information Security , pp. 158-178
    • Zhang, Y.1    Blanton, M.2
  • 14
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • Springer
    • S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large datasets, " in Advances in Cryptology-CRYPTO. Springer, 2011, pp. 111-131.
    • (2011) Advances in Cryptology-CRYPTO. , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.