Secure and efficient outsourcing computation on large-scale linear regressions
DOI10.1016/J.INS.2020.03.003zbMATH Open1458.68280OpenAlexW3010362444MaRDI QIDQ2663473FDOQ2663473
Authors: Yang Yang, Ping Xiong, Qing Huang, Fei Chen
Publication date: 19 April 2021
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2020.03.003
Recommendations
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
- Verifiable and secure outsourcing protocol for convex quadratic programming
- Privacy-preserving ridge regression with only linearly-homomorphic encryption
- Secure collaborative outsourced \(k\)-nearest neighbor classification with multiple owners in cloud environment
- Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds
Linear regression; mixed models (62J05) Data encryption (aspects in computer science) (68P25) Distributed algorithms (68W15) Network protocols (68M12) Privacy of data (68P27)
Cites Work
- Machine learning. A probabilistic perspective
- Fully homomorphic encryption using ideal lattices
- How to share a secret
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Improved delegation of computation using fully homomorphic encryption
- How to delegate computations
- Introduction to modern cryptography.
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
Cited In (7)
- Secure Tensor Decomposition for Big Data Using Transparent Computing Paradigm
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
- Privacy-preserving ridge regression with only linearly-homomorphic encryption
- Verifiable and secure outsourcing protocol for convex quadratic programming
- Toward practical privacy-preserving linear regression
- Privacy-enhanced and non-interactive linear regression with dropout-resilience
Uses Software
This page was built for publication: Secure and efficient outsourcing computation on large-scale linear regressions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2663473)