Results 41 to 50 of about 1,001 (165)
Substring-searchable attribute-based encryption and its application for IoT devices
With the development of big data and cloud computing technology, more and more users choose to store data on cloud servers, which brings much convenience to their management and use of data, and also the risk of data leakage.
Xi Sun +6 more
doaj +1 more source
Smart Contracts for Incentivized Outsourcing of Computation
Outsourcing computation allows a resource limited client to expand its computational capabilities by outsourcing computation to other computing nodes or clouds. A basic requirement of outsourcing is providing assurance that the computation result is correct.
Kupcu, Alptekin, Safavi-Naini, Reihaneh
openaire +2 more sources
Optimal Contracts for Outsourced Computation [PDF]
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest” contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards ...
Viet Pham, M. H. R. Khouzani, Carlos Cid
openaire +1 more source
Cloud outsourcing secret sharing scheme against covert adversaries
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of ...
En ZHANG +5 more
doaj +2 more sources
Delegation of computation with verification outsourcing
In the Cloud Computing paradigm, a user often reduces financial, personnel, and computational burdens by outsourcing computation and other IT services to a professional service provider. However, to be able to assure the correctness of the result, the user still needs to perform the verification himself.
Gang Xu, George T. Amariucai, Yong Guan
openaire +1 more source
Verifiable outsourced computation over encrypted data [PDF]
Abstract In recent years, cloud computing has become the most popular and promising service platform. A cloud user can outsource its heavy computation overhead to a cloud service provider (CSP) and let the CSP make the computation instead. In order to guarantee the correctness of the outsourced processing (e.g., machine learning and data ...
Yu, Xixun, Yan, Zheng, Zhang, Rui
openaire +2 more sources
Personal health record (PHR) is a patient-centric model of health information exchange, which greatly facilitates the storage, access, and share of personal health information. In order to share the valuable resources and reduce the operational cost, the
Fuhu Deng +5 more
doaj +1 more source
Outsourcing Computing of Large Matrix Jordan Decomposition
The Jordan decomposition of matrix is a typical scientific and engineering computational task, but such computation involves enormous computing resources for large matrices, which is burdensome for the resource‐limited clients. Cloud computing enables computational resource‐limited clients to economically outsource such problems to the cloud server ...
Hongfeng Wu, Jingjing Yan
openaire +1 more source
BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation
Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices.
Lijing Zhou +3 more
doaj +1 more source
Incentivized Outsourced Computation Resistant to Malicious Contractors [PDF]
With the rise of Internet computing, outsourcing difficult computational tasks became an important need. Yet, once the computation is outsourced, the job owner loses control, and hence it is crucial to provide guarantees against malicious actions of the contractors involved.
openaire +2 more sources

