Results 21 to 30 of about 1,001 (165)
Verifiable Summation of Read-Once Formula Specified Data
Securely outsourcing computation to untrusted cloud servers has attracted a lot of attention in recent years. In this paper we consider datasets where every item is labeled by a number of attributes and study the problem of securely outsourcing the ...
Yan He, Liang Feng Zhang
doaj +1 more source
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj +1 more source
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing
Yang Yang, Guanghua Song
doaj +1 more source
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin +3 more
doaj +1 more source
Algorithms for Outsourcing Pairing Computation [PDF]
We address the question of how a computationally limited device may outsource pairing computation in cryptography to another, potentially malicious, but much more computationally powerful device. We introduce two new efficient protocols for securely outsourcing pairing computations to an untrusted helper.
Guillevic, Aurore, Vergnaud, Damien
openaire +2 more sources
Efficiently Outsourcing Multiparty Computation Under Multiple Keys [PDF]
Secure multiparty computation enables a set of users to evaluate certain functionalities on their respective inputs while keeping these inputs encrypted throughout the computation. In many applications, however, outsourcing these computations to an untrusted server is desirable, so that the server can perform the computation on behalf of the users ...
Peter, Andreas +2 more
openaire +1 more source
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj +1 more source
Verifying Outsourced Computation in an Edge Computing Marketplace
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions in the presence of both ...
Harth-Kitzerow, Christopher +1 more
openaire +2 more sources
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.
Shuai Li +3 more
doaj +1 more source
Privacy-preserving verifiable delegation of polynomial and matrix functions
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj +1 more source

