Results 11 to 20 of about 1,001 (165)

Outsourcing Private RAM Computation [PDF]

open access: yes2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 2014
We construct the first schemes that allow a client to privately outsource arbitrary program executions to a remote server while ensuring that: (I) the client's work is small and essentially independent of the complexity of the computation being outsourced, and (II) the server's work is only proportional to the run-time of the computation on a random ...
Craig Gentry   +3 more
openaire   +1 more source

A Framework for Outsourcing of Secure Computation [PDF]

open access: yesProceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest.In our setting there is a number of clients C_1,…,Cn with inputs x1,…,xn. The clients want to delegate a secure computation of f(x1,…,xn) to a set of untrusted workers W1,
Thomas P. Jakobsen   +2 more
openaire   +1 more source

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

A Comprehensive Survey on Secure Outsourced Computation and Its Applications

open access: yesIEEE Access, 2019
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang   +6 more
doaj   +1 more source

Privacy-preserving trajectory similarity computation method

open access: yesTongxin xuebao, 2022
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU   +4 more
doaj   +2 more sources

Outsourcing Large-Scale Quadratic Programming to a Public Cloud

open access: yesIEEE Access, 2015
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj   +1 more source

Outsourcing Computation: The Minimal Refereed Mechanism [PDF]

open access: yes, 2019
17 pages, 1 figure; WINE 2019: The 15th Conference on Web and Internet ...
Yuqing Kong   +3 more
openaire   +2 more sources

Secure efficient and verifiable large linear equations solve outsourcing computing scheme

open access: yes网络与信息安全学报, 2017
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj   +3 more sources

Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

open access: yesThe Scientific World Journal, 2014
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun   +5 more
doaj   +1 more source

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

open access: yesIEEE Access, 2019
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use ...
Shengxia Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy