메뉴 건너뛰기




Volumn 9955 LNCS, Issue , 2016, Pages 349-362

MD-VCmatrix: An efficient scheme for publicly verifiable computation of outsourced matrix multiplication

Author keywords

Cloud computing; Matrix multiplication; Outsourced computation; Public verification

Indexed keywords

CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY;

EID: 84989856350     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-46298-1_23     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • ACM, New York
    • Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: 19th ACM Conference on Computer and Communications Security, pp. 501–512. ACM, New York (2012)
    • (2012) 19Th ACM Conference on Computer and Communications Security , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 3
    • 84964853019 scopus 로고    scopus 로고
    • Enabling efficient and secure outsourcing of large matrix multiplications
    • IEEE Press, New York
    • Jia, K., Li, H., Liu, D., Yu, S.: Enabling efficient and secure outsourcing of large matrix multiplications. In: IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE Press, New York (2015)
    • (2015) IEEE Global Communications Conference (GLOBECOM) , pp. 1-6
    • Jia, K.1    Li, H.2    Liu, D.3    Yu, S.4
  • 4
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.), Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7-25
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 5
    • 84934276953 scopus 로고    scopus 로고
    • Verifiable and secure outsourcing of matrix calculation and its application
    • Hu, X., Pei, D., Tang, C., Wong, D.: Verifiable and secure outsourcing of matrix calculation and its application. Scientia inica (Informationis) 43(7), 842–852 (2013)
    • (2013) Scientia Inica (Informationis) , vol.43 , Issue.7 , pp. 842-852
    • Hu, X.1    Pei, D.2    Tang, C.3    Wong, D.4
  • 6
    • 84916890442 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of large-scale systems of linear equations
    • Chen, X., Huang, X., Li, J., Ma, J., Lou, W., Wong, D.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2015)
    • (2015) IEEE Trans. Inf. Forensics Secur , vol.10 , Issue.1 , pp. 69-78
    • Chen, X.1    Huang, X.2    Li, J.3    Ma, J.4    Lou, W.5    Wong, D.6
  • 11
    • 84919819478 scopus 로고    scopus 로고
    • Outsourcing large matrix inversion computation to a public cloud
    • Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1(1), 1 (2013). http://eeexplore.ieee.org/xpls/absall.jsp?arnumber=6613485&tag=1
    • (2013) IEEE Trans. Cloud Comput , vol.1 , Issue.1
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4    Hu, C.5
  • 12
    • 84902436467 scopus 로고    scopus 로고
    • Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
    • Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)
    • (2014) Inf. Sci , vol.280 , pp. 205-217
    • Lei, X.1    Liao, X.2    Huang, T.3    Heriniaina, F.4
  • 13
    • 84944078971 scopus 로고    scopus 로고
    • Cloud computing service: The case of large matrix determinant computation
    • Lei, X., Liao, X., Huang, T., Li, H.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8(5), 688–700 (2015)
    • (2015) IEEE Trans. Serv. Comput , vol.8 , Issue.5 , pp. 688-700
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4
  • 14
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • Wang, C., Ren, K., Wang, J., Wang, Q.: Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24(6), 1172–1181 (2013)
    • (2013) IEEE Trans. Parallel Distrib. Syst , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Ren, K.2    Wang, J.3    Wang, Q.4
  • 15
    • 84891322736 scopus 로고    scopus 로고
    • Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    • Chen, F., Xiang, T., Yang, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)
    • (2014) J. Parallel Distrib. Comput , vol.74 , Issue.3 , pp. 2141-2151
    • Chen, F.1    Xiang, T.2    Yang, Y.3
  • 17
    • 84954231523 scopus 로고    scopus 로고
    • Efficient secure outsourcing of large-scale linear systems of equations
    • IEEE Press, New York
    • Salinas, S., Luo, C., Chen, X., Li, P.: Efficient secure outsourcing of large-scale linear systems of equations. In: IEEE INFOCOM 2015, pp. 1035–1043. IEEE Press, New York (2015)
    • (2015) IEEE INFOCOM 2015 , pp. 1035-1043
    • Salinas, S.1    Luo, C.2    Chen, X.3    Li, P.4
  • 18
    • 77955176662 scopus 로고    scopus 로고
    • Efficient privacypreserving similar document detection
    • Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacypreserving similar document detection. VLDB J. 19(4), 457–475 (2010)
    • (2010) VLDB J , vol.19 , Issue.4 , pp. 457-475
    • Murugesan, M.1    Jiang, W.2    Clifton, C.3    Si, L.4    Vaidya, J.5
  • 19
    • 84879706154 scopus 로고    scopus 로고
    • Secure scalar product computation of vectors in cloud computing
    • Sheng, G., Wen, T., Guo, Q., Yin, Y.: Secure scalar product computation of vectors in cloud computing. J. Northeast. Univ. 34(6), 786–791 (2013)
    • (2013) J. Northeast. Univ , vol.34 , Issue.6 , pp. 786-791
    • Sheng, G.1    Wen, T.2    Guo, Q.3    Yin, Y.4
  • 21
    • 79960862322 scopus 로고    scopus 로고
    • Secure practical outsourcing of linear programming in cloud computing
    • IEEE Press, New York
    • Wang, C., Ren, K., Wang, J.: Secure practical outsourcing of linear programming in cloud computing. In: IEEE INFOCOM 2011, pp. 820–828. IEEE Press, New York (2011)
    • (2011) IEEE INFOCOM 2011 , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 22
    • 84936803501 scopus 로고    scopus 로고
    • Privacy-preserving face recognition with outsourced computation
    • Xiang, C., Tang, C., Cai, Y., Xu, Q.: Privacy-preserving face recognition with outsourced computation. Soft Comput. 20(9), 3735–3744 (2016)
    • (2016) Soft Comput , vol.20 , Issue.9 , pp. 3735-3744
    • Xiang, C.1    Tang, C.2    Cai, Y.3    Xu, Q.4
  • 24
    • 84883089676 scopus 로고    scopus 로고
    • Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
    • IEEE Press, New York
    • Jung, T., Mao, X., Li, X.Y., Tang, S.J., Gong, W., Zhang, L.: Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: IEEE INFOCOM 2013, pp. 2634–2642. IEEE Press, New York (2013)
    • (2013) IEEE INFOCOM 2013 , pp. 2634-2642
    • Jung, T.1    Mao, X.2    Li, X.Y.3    Tang, S.J.4    Gong, W.5    Zhang, L.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.