Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
From MaRDI portal
Publication:2441503
DOI10.1016/j.jpdc.2013.11.007zbMath1283.68069OpenAlexW1988007981MaRDI QIDQ2441503
Tao Xiang, Fei Chen, Yuan-Yuan Yang
Publication date: 25 March 2014
Published in: Journal of Parallel and Distributed Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jpdc.2013.11.007
linear programmingdistributed computingcloud computingcomputation outsourcinglinear equation solving
Related Items
Secure and efficient outsourcing computation on large-scale linear regressions, Cloud-assisted privacy-conscious large-scale Markowitz portfolio, How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields, A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Privacy-preserving linear programming
- Privacy-preserving horizontally partitioned linear programs
- Mathematics of Public Key Cryptography
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
- The university of Florida sparse matrix collection
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Improved Delegation of Computation Using Fully Homomorphic Encryption
- Communication Theory of Secrecy Systems*
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- The knowledge complexity of interactive proof-systems
- Fully homomorphic encryption using ideal lattices
- Verifiable Delegation of Computation over Large Datasets