Results 11 to 20 of about 1,001 (165)
Outsourcing Private RAM Computation [PDF]
We construct the first schemes that allow a client to privately outsource arbitrary program executions to a remote server while ensuring that: (I) the client's work is small and essentially independent of the complexity of the computation being outsourced, and (II) the server's work is only proportional to the run-time of the computation on a random ...
Craig Gentry +3 more
openaire +1 more source
A Framework for Outsourcing of Secure Computation [PDF]
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest.In our setting there is a number of clients C_1,…,Cn with inputs x1,…,xn. The clients want to delegate a secure computation of f(x1,…,xn) to a set of untrusted workers W1,
Thomas P. Jakobsen +2 more
openaire +1 more source
Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj +1 more source
A Comprehensive Survey on Secure Outsourced Computation and Its Applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing.
Yang Yang +6 more
doaj +1 more source
Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU +4 more
doaj +2 more sources
Outsourcing Large-Scale Quadratic Programming to a Public Cloud
Cloud computing provides service for resource-constrained customers to perform large-scale scientific computation. However, it also brings some new challenges, which have to be considered in designing outsourcing protocols.
Lifeng Zhou, Chunguang Li
doaj +1 more source
Outsourcing Computation: The Minimal Refereed Mechanism [PDF]
17 pages, 1 figure; WINE 2019: The 15th Conference on Web and Internet ...
Yuqing Kong +3 more
openaire +2 more sources
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in ...
Xing-lan ZHANG,Xiang LIU
doaj +3 more sources
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario.
Yi Sun +5 more
doaj +1 more source
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use ...
Shengxia Zhang +4 more
doaj +1 more source

