메뉴 건너뛰기




Volumn 479, Issue , 2019, Pages 664-678

New publicly verifiable computation for batch matrix multiplication

Author keywords

Batch matrix multiplication; Privacy protection; Public delegation; Publicly verifiable computation

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; LINEAR TRANSFORMATIONS; OUTSOURCING;

EID: 85037050338     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2017.11.063     Document Type: Article
Times cited : (50)

References (52)
  • 4
    • 0036867930 scopus 로고    scopus 로고
    • Preconditioning techniques for large linear systems: a survey
    • Benzi, M., Preconditioning techniques for large linear systems: a survey. J. Comput. Phys. 182:2 (2002), 418–477.
    • (2002) J. Comput. Phys. , vol.182 , Issue.2 , pp. 418-477
    • Benzi, M.1
  • 5
    • 0000619172 scopus 로고
    • Self-testing/correcting with applications to numerical problems
    • Blum, M., Luby, M., Rubinfeld, R., Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci. 47:3 (1993), 549–595.
    • (1993) J. Comput. Syst. Sci. , vol.47 , Issue.3 , pp. 549-595
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 6
    • 85019176675 scopus 로고    scopus 로고
    • Introduction to secure outsourcing computation
    • Chen, X., Introduction to secure outsourcing computation. Synth. Lect. Inf. Secur., Privacy, Trust 8:2 (2016), 1–93.
    • (2016) Synth. Lect. Inf. Secur., Privacy, Trust , vol.8 , Issue.2 , pp. 1-93
    • Chen, X.1
  • 7
    • 84916890442 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of large-scale systems of linear equations
    • Chen, X., Huang, X., Li, J., Ma, J., New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10:1 (2015), 69–78.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.1 , pp. 69-78
    • Chen, X.1    Huang, X.2    Li, J.3    Ma, J.4
  • 9
    • 84906242615 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W., New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25:9 (2014), 2386–2396.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.9 , pp. 2386-2396
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 10
    • 84987657487 scopus 로고    scopus 로고
    • Verifiable computation over large database with incremental updates
    • Chen, X., Li, J., Weng, J., Ma, J., Lou, W., Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65:10 (2016), 3184–3195.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.10 , pp. 3184-3195
    • Chen, X.1    Li, J.2    Weng, J.3    Ma, J.4    Lou, W.5
  • 11
    • 50449117974 scopus 로고
    • The lorentz transformation and absolute time
    • Dirac, P., The lorentz transformation and absolute time. Physica 19:1 (1953), 888–896.
    • (1953) Physica , vol.19 , Issue.1 , pp. 888-896
    • Dirac, P.1
  • 14
    • 0029490594 scopus 로고
    • Solution of dense systems of linear equations arising from integral-equation formulations
    • Forsman, K., Gropp, W., Kettunen, L., Levine, D., Salonen, J., Solution of dense systems of linear equations arising from integral-equation formulations. IEEE Antennas Propag. Mag. 37:6 (1995), 96–100.
    • (1995) IEEE Antennas Propag. Mag. , vol.37 , Issue.6 , pp. 96-100
    • Forsman, K.1    Gropp, W.2    Kettunen, L.3    Levine, D.4    Salonen, J.5
  • 18
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C., The knowledge complexity of interactive proof systems. SIAM J. Comput. 18:1 (1989), 186–208.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 21
    • 84894444941 scopus 로고    scopus 로고
    • Automating cloud services life cycle through semantic technologies
    • Joshi, K.P., Yesha, Y., Finin, T., Automating cloud services life cycle through semantic technologies. IEEE Trans. Serv. Comput. 7:1 (2012), 109–122.
    • (2012) IEEE Trans. Serv. Comput. , vol.7 , Issue.1 , pp. 109-122
    • Joshi, K.P.1    Yesha, Y.2    Finin, T.3
  • 23
    • 84902436467 scopus 로고    scopus 로고
    • Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
    • Lei, X., Liao, X., Huang, T., Heriniaina, F., Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280 (2014), 205–217.
    • (2014) Inf. Sci. , vol.280 , pp. 205-217
    • Lei, X.1    Liao, X.2    Huang, T.3    Heriniaina, F.4
  • 24
    • 84919819478 scopus 로고    scopus 로고
    • Outsourcing large matrix inversion computation to a public cloud
    • Lei, X., Liao, X., Huang, T., Li, H., Hu, C., Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1:1 (2013), 78–87.
    • (2013) IEEE Trans. Cloud Comput. , vol.1 , Issue.1 , pp. 78-87
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4    Hu, C.5
  • 25
    • 84944078971 scopus 로고    scopus 로고
    • Cloud computing service: the case of large matrix determinant computation
    • Lei, X., Liao, X., Huang, T., Li, H., Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8:5 (2015), 688–700.
    • (2015) IEEE Trans. Serv. Comput. , vol.8 , Issue.5 , pp. 688-700
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4
  • 28
    • 85028920194 scopus 로고    scopus 로고
    • Secure attribute-based data sharing for resource-limited users in cloud computing
    • Li, J., Zhang, Y., Chen, X., Xiang, Y., Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1–12.
    • (2018) Comput. Secur. , vol.72 , pp. 1-12
    • Li, J.1    Zhang, Y.2    Chen, X.3    Xiang, Y.4
  • 29
  • 31
    • 84945485084 scopus 로고    scopus 로고
    • Kdvem: a k-degree anonymity with vertex and edge modification algorithm
    • Ma, T., Zhang, Y., Cao, J., Shen, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Kdvem: a k-degree anonymity with vertex and edge modification algorithm. Computing 97:12 (2015), 1165–1184.
    • (2015) Computing , vol.97 , Issue.12 , pp. 1165-1184
    • Ma, T.1    Zhang, Y.2    Cao, J.3    Shen, J.4    Tang, M.5    Tian, Y.6    Al-Dhelaan, A.7    Al-Rodhaan, M.8
  • 33
    • 84894430070 scopus 로고    scopus 로고
    • A scalable architecture for automatic service composition
    • Paik, I., Chen, W., Huhns, M.N., A scalable architecture for automatic service composition. IEEE Trans. Serv. Comput. 7:1 (2014), 82–95.
    • (2014) IEEE Trans. Serv. Comput. , vol.7 , Issue.1 , pp. 82-95
    • Paik, I.1    Chen, W.2    Huhns, M.N.3
  • 34
    • 84883814353 scopus 로고    scopus 로고
    • Themis: a mutually verifiable billing system for the cloud computing environment
    • Park, K.W., Han, J., Chung, J.W., Park, K.H., Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6:3 (2013), 300–313.
    • (2013) IEEE Trans. Serv. Comput. , vol.6 , Issue.3 , pp. 300-313
    • Park, K.W.1    Han, J.2    Chung, J.W.3    Park, K.H.4
  • 37
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • Ren, K., Wang, C., Wang, Q., Security challenges for the public cloud. IEEE Internet Comput. 16:1 (2012), 69–73.
    • (2012) IEEE Internet Comput. , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 39
    • 85020435750 scopus 로고    scopus 로고
    • An efficient public auditing protocol with novel dynamic structure for cloud data
    • Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12:10 (2017), 2402–2415.
    • (2017) IEEE Trans. Inf. Forensics Secur. , vol.12 , Issue.10 , pp. 2402-2415
    • Shen, J.1    Shen, J.2    Chen, X.3    Huang, X.4    Susilo, W.5
  • 42
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Wang, C., Cao, N., Ren, K., Lou, W., Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23:8 (2012), 1467–1479.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 43
    • 84961752964 scopus 로고    scopus 로고
    • Secure optimization computation outsourcing in cloud computing: a case study of linear programming
    • Wang, C., Ren, K., Wang, J., Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Trans. Comput. 65:1 (2016), 216–229.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.1 , pp. 216-229
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 44
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • Wang, C., Ren, K., Wang, J., Wang, Q., Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24:6 (2013), 1172–1181.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Ren, K.2    Wang, J.3    Wang, Q.4
  • 45
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5:2 (2012), 220–232.
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 46
    • 84961746418 scopus 로고    scopus 로고
    • Privacy-assured outsourcing of image reconstruction service in cloud
    • Wang, C., Zhang, B., Ren, K., Roveda, J.M., Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1:1 (2013), 166–177.
    • (2013) IEEE Trans. Emerg. Top. Comput. , vol.1 , Issue.1 , pp. 166-177
    • Wang, C.1    Zhang, B.2    Ren, K.3    Roveda, J.M.4
  • 47
    • 84960539113 scopus 로고    scopus 로고
    • Verifiable auditing for outsourced database in cloud computing
    • Wang, J., Chen, X., Huang, X., You, I., Xiang, Y., Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64:11 (2015), 3293–3303.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.11 , pp. 3293-3303
    • Wang, J.1    Chen, X.2    Huang, X.3    You, I.4    Xiang, Y.5
  • 51
    • 78649302229 scopus 로고    scopus 로고
    • Cloud computing: state-of-theart and research challenges
    • Zhang, Q., Cheng, L., Boutaba, R., Cloud computing: state-of-theart and research challenges. J. Internet Serv. Appl. 1:1 (2010), 7–18.
    • (2010) J. Internet Serv. Appl. , vol.1 , Issue.1 , pp. 7-18
    • Zhang, Q.1    Cheng, L.2    Boutaba, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.