메뉴 건너뛰기




Volumn 10232 LNCS, Issue , 2017, Pages 53-65

New publicly verifiable computation for batch matrix multiplication

Author keywords

Batch matrix multiplication; Privacy protection; Public delegation; Publicly verifiable computation

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; GREEN COMPUTING; LINEAR TRANSFORMATIONS; OUTSOURCING;

EID: 85019179676     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-57186-7_5     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 1
    • 85019176675 scopus 로고    scopus 로고
    • Introduction to secure outsourcing computation
    • Chen, X.: Introduction to secure outsourcing computation. Synth. Lect. Inf. Secur. Priv. Trust 8, 1–93 (2016)
    • (2016) Synth. Lect. Inf. Secur. Priv. Trust , vol.8 , pp. 1-93
    • Chen, X.1
  • 2
    • 84894444941 scopus 로고    scopus 로고
    • Automating cloud services life cycle through semantic technologies
    • Joshi, K.P., Yesha, Y., Finin, T.: Automating cloud services life cycle through semantic technologies. IEEE Trans. Serv. Comput. 7, 109–122 (2012)
    • (2012) IEEE Trans. Serv. Comput , vol.7 , pp. 109-122
    • Joshi, K.P.1    Yesha, Y.2    Finin, T.3
  • 3
    • 84894430070 scopus 로고    scopus 로고
    • A scalable architecture for automatic service composition
    • Paik, I., Chen, W., Huhns, M.N.: A scalable architecture for automatic service composition. IEEE Trans. Serv. Comput. 7, 82–95 (2014)
    • (2014) IEEE Trans. Serv. Comput , vol.7 , pp. 82-95
    • Paik, I.1    Chen, W.2    Huhns, M.N.3
  • 4
    • 84883814353 scopus 로고    scopus 로고
    • Themis: A mutually verifiable billing system for the cloud computing environment
    • Park, K.W., Han, J., Chung, J.W., Park, K.H.: Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6, 300– 313 (2013)
    • (2013) IEEE Trans. Serv. Comput. , vol.6
    • Park, K.W.1    Han, J.2    Chung, J.W.3    Park, K.H.4
  • 5
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5, 220–232 (2012)
    • (2012) IEEE Trans. Serv. Comput , vol.5 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 6
    • 84961746418 scopus 로고    scopus 로고
    • Privacy-assured outsourcing of image reconstruction service in cloud
    • Wang, C., Zhang, B., Ren, K., Roveda, J.M.: Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1, 166–177 (2013)
    • (2013) IEEE Trans. Emerg. Top. Comput , vol.1 , pp. 166-177
    • Wang, C.1    Zhang, B.2    Ren, K.3    Roveda, J.M.4
  • 7
    • 84916890442 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of large-scale systems of linear equations
    • Chen, X., Huang, X., Li, J., Ma, J.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10, 69– 78 (2015)
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10
    • Chen, X.1    Huang, X.2    Li, J.3    Ma, J.4
  • 8
    • 84902436467 scopus 로고    scopus 로고
    • Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud.
    • Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)
    • (2014) Inf. Sci. , vol.280 , pp. 205-217
    • Lei, X.1    Liao, X.2    Huang, T.3    Heriniaina, F.4
  • 9
    • 84919819478 scopus 로고    scopus 로고
    • Outsourcing large matrix inversion computation to a public cloud
    • Lei, X., Liao, X., Huang, T., Li, H.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1, 1 (2013)
    • (2013) IEEE Trans. Cloud Comput , vol.1 , pp. 1
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4
  • 10
    • 84944078971 scopus 로고    scopus 로고
    • Cloud computing service: The case of large matrix determinant computation
    • Lei, X., Liao, X., Huang, T., Li, H.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)
    • (2015) IEEE Trans. Serv. Comput , vol.8 , pp. 688-700
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4
  • 11
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM Conference on Computer and Communications Security, pp. 501–512(2012)
    • (2012) ACM Conference on Computer and Communications Security , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 12
    • 84906483939 scopus 로고    scopus 로고
    • Verifiable delegation of computations with storage-verification trade-off
    • Kuty̷lowski, M., Vaidya, J. (eds.) ESORICS 2014, Springer, Cham
    • Zhang, L.F., Safavi-Naini, R.: Verifiable delegation of computations with storage-verification trade-off. In: Kuty̷lowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 112–129. Springer, Cham (2014). doi:10.1007/978-3-319-11203-9 7
    • (2014) LNCS , vol.8712 , pp. 112-129
    • Zhang, L.F.1    Safavi-Naini, R.2
  • 13
    • 84921350434 scopus 로고    scopus 로고
    • Efficient secure and verifiable outsourcing of matrix multiplications
    • Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014, Springer, Cham
    • Zhang, Y., Blanton, M.: Efficient secure and verifiable outsourcing of matrix multiplications. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 158–178. Springer, Cham (2014). doi:10.1007/978-3-319-13257-0 10
    • (2014) LNCS , vol.8783 , pp. 158-178
    • Zhang, Y.1    Blanton, M.2
  • 15
    • 84989856350 scopus 로고    scopus 로고
    • MD-VCMatrix: An efficient scheme for publicly verifiable computation of outsourced matrix multiplication
    • Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016, Springer, Cham
    • Sheng, G., Tang, C., Gao, W., Yin, Y.: MD-VCMatrix: an efficient scheme for publicly verifiable computation of outsourced matrix multiplication. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 349–362. Springer, Cham (2016). doi:10.1007/978-3-319-46298-1 23
    • (2016) LNCS , vol.9955 , pp. 349-362
    • Sheng, G.1    Tang, C.2    Gao, W.3    Yin, Y.4
  • 16
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.) CRYPTO 2010, Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7 25
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 17
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Cramer, R. (ed.) TCC 2012, Springer, Heidelberg
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28914-9 24
    • (2012) LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.