Results 41 to 50 of about 1,001 (165)

Substring-searchable attribute-based encryption and its application for IoT devices

open access: yesDigital Communications and Networks, 2021
With the development of big data and cloud computing technology, more and more users choose to store data on cloud servers, which brings much convenience to their management and use of data, and also the risk of data leakage.
Xi Sun   +6 more
doaj   +1 more source

Smart Contracts for Incentivized Outsourcing of Computation

open access: yes, 2022
Outsourcing computation allows a resource limited client to expand its computational capabilities by outsourcing computation to other computing nodes or clouds. A basic requirement of outsourcing is providing assurance that the computation result is correct.
Kupcu, Alptekin, Safavi-Naini, Reihaneh
openaire   +2 more sources

Optimal Contracts for Outsourced Computation [PDF]

open access: yes, 2014
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest” contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards ...
Viet Pham, M. H. R. Khouzani, Carlos Cid
openaire   +1 more source

Cloud outsourcing secret sharing scheme against covert adversaries

open access: yesTongxin xuebao, 2017
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of ...
En ZHANG   +5 more
doaj   +2 more sources

Delegation of computation with verification outsourcing

open access: yesProceedings of the 2013 ACM symposium on Principles of distributed computing, 2013
In the Cloud Computing paradigm, a user often reduces financial, personnel, and computational burdens by outsourcing computation and other IT services to a professional service provider. However, to be able to assure the correctness of the result, the user still needs to perform the verification himself.
Gang Xu, George T. Amariucai, Yong Guan
openaire   +1 more source

Verifiable outsourced computation over encrypted data [PDF]

open access: yesInformation Sciences, 2019
Abstract In recent years, cloud computing has become the most popular and promising service platform. A cloud user can outsource its heavy computation overhead to a cloud service provider (CSP) and let the CSP make the computation instead. In order to guarantee the correctness of the outsourced processing (e.g., machine learning and data ...
Yu, Xixun, Yan, Zheng, Zhang, Rui
openaire   +2 more sources

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records

open access: yesIEEE Access, 2018
Personal health record (PHR) is a patient-centric model of health information exchange, which greatly facilitates the storage, access, and share of personal health information. In order to share the valuable resources and reduce the operational cost, the
Fuhu Deng   +5 more
doaj   +1 more source

Outsourcing Computing of Large Matrix Jordan Decomposition

open access: yesMathematical Problems in Engineering, 2019
The Jordan decomposition of matrix is a typical scientific and engineering computational task, but such computation involves enormous computing resources for large matrices, which is burdensome for the resource‐limited clients. Cloud computing enables computational resource‐limited clients to economically outsource such problems to the cloud server ...
Hongfeng Wu, Jingjing Yan
openaire   +1 more source

BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation

open access: yesSensors, 2018
Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices.
Lijing Zhou   +3 more
doaj   +1 more source

Incentivized Outsourced Computation Resistant to Malicious Contractors [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2017
With the rise of Internet computing, outsourcing difficult computational tasks became an important need. Yet, once the computation is outsourced, the job owner loses control, and hence it is crucial to provide guarantees against malicious actions of the contractors involved.
openaire   +2 more sources

Home - About - Disclaimer - Privacy