Secure and efficient outsourcing computation on large-scale linear regressions
From MaRDI portal
Publication:2663473
Recommendations
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
- Verifiable and secure outsourcing protocol for convex quadratic programming
- Privacy-preserving ridge regression with only linearly-homomorphic encryption
- Secure collaborative outsourced \(k\)-nearest neighbor classification with multiple owners in cloud environment
- Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds
Cites work
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Fully homomorphic encryption using ideal lattices
- How to delegate computations
- How to share a secret
- Improved delegation of computation using fully homomorphic encryption
- Introduction to modern cryptography.
- Machine learning. A probabilistic perspective
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
Cited in
(7)- Privacy-enhanced and non-interactive linear regression with dropout-resilience
- Secure Tensor Decomposition for Big Data Using Transparent Computing Paradigm
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
- Privacy-preserving ridge regression with only linearly-homomorphic encryption
- Verifiable and secure outsourcing protocol for convex quadratic programming
- Toward practical privacy-preserving linear regression
This page was built for publication: Secure and efficient outsourcing computation on large-scale linear regressions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2663473)