Results 21 to 30 of about 1,001 (165)

Verifiable Summation of Read-Once Formula Specified Data

open access: yesIEEE Access, 2020
Securely outsourcing computation to untrusted cloud servers has attracted a lot of attention in recent years. In this paper we consider datasets where every item is labeled by a number of attributes and study the problem of securely outsourcing the ...
Yan He, Liang Feng Zhang
doaj   +1 more source

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

open access: yesSensors, 2021
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data.
Mingyang Song, Yingpeng Sang
doaj   +1 more source

Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage

open access: yesInformation, 2023
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing
Yang Yang, Guanghua Song
doaj   +1 more source

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

open access: yesIEEE Access, 2018
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and ...
Changlu Lin   +3 more
doaj   +1 more source

Algorithms for Outsourcing Pairing Computation [PDF]

open access: yes, 2015
We address the question of how a computationally limited device may outsource pairing computation in cryptography to another, potentially malicious, but much more computationally powerful device. We introduce two new efficient protocols for securely outsourcing pairing computations to an untrusted helper.
Guillevic, Aurore, Vergnaud, Damien
openaire   +2 more sources

Efficiently Outsourcing Multiparty Computation Under Multiple Keys [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2013
Secure multiparty computation enables a set of users to evaluate certain functionalities on their respective inputs while keeping these inputs encrypted throughout the computation. In many applications, however, outsourcing these computations to an untrusted server is desirable, so that the server can perform the computation on behalf of the users ...
Peter, Andreas   +2 more
openaire   +1 more source

Security Outsourcing Algorithms by Unimodular Matrix Encryption Method

open access: yesJisuanji kexue yu tansuo, 2020
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj   +1 more source

Verifying Outsourced Computation in an Edge Computing Marketplace

open access: yesMachine Learning & Applications, 2022
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions in the presence of both ...
Harth-Kitzerow, Christopher   +1 more
openaire   +2 more sources

CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

open access: yesDigital Communications and Networks, 2017
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.
Shuai Li   +3 more
doaj   +1 more source

Privacy-preserving verifiable delegation of polynomial and matrix functions

open access: yesJournal of Mathematical Cryptology, 2020
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj   +1 more source

Home - About - Disclaimer - Privacy