Results 151 to 160 of about 79,561 (230)
Some of the next articles are maybe not open access.
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things
IEEE Internet of Things Journal, 2020Rivest–Shamir–Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) devices, as it is based on the modular exponentiation of a large number ...
Hanlin Zhang +6 more
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2020
Multimedia data needs huge storage space, and application of multimedia data needs powerful capability of computing. Cloud computing can help owner of multimedia data to deal with it.
Linzhi Jiang +4 more
semanticscholar +1 more source
Multimedia data needs huge storage space, and application of multimedia data needs powerful capability of computing. Cloud computing can help owner of multimedia data to deal with it.
Linzhi Jiang +4 more
semanticscholar +1 more source
Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
IEEE Internet of Things Journal, 2020Modular exponentiation, an operation widely utilized in cryptographic protocols to transfer text and other forms of data, can also be applied to Internet-of-Things (IoT) devices with high security requirements.
Qilin Hu +4 more
semanticscholar +1 more source
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
IEEE Transactions on Cloud Computing, 2023As one of the key technologies to enable the internet of things (IoT), cloud computing plays a significant role in providing huge computing and storage facilities for large-scale data.
Z.-E.P. Liu +6 more
semanticscholar +1 more source
MD-SONIC: Maliciously-Secure Outsourcing Neural Network Inference With Reduced Online Communication
IEEE Transactions on Information Forensics and SecurityWith the widespread deployment of Deep-Learning-as-a-Service, secure multi-party computation-based outsourcing neural network (NN) inference has garnered significant attention for its high-security guarantee.
Yansong Zhang +6 more
semanticscholar +1 more source
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud
Computer/law journal, 2020Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio ...
Qianqian Su, Rui Zhang, Rui Xue
semanticscholar +1 more source
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment
IEEE Internet of Things JournalIn existing secret medical-image sharing (SMIS) schemes, to protect and manage secret medical-images (SMIs), the sharing and recovery of each SMI are implemented by local servers of medical institutions.
Jingwang Huang +5 more
semanticscholar +1 more source
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
International Conference on Trust, Security and Privacy in Computing and Communications, 2020As one of the most expensive computations in public-key cryptosystems, modular exponentiation is typically out-sourced to the cloud servers. Traditional cloud-based outsourcing algorithms depend on multiple untrusted servers to guarantee the security ...
Tianyi Zhang, Jian Wang
semanticscholar +1 more source
2011
The development of multi-party computation was one of the early achievements of theoretical cryptography. Since that time a number of papers have been published which look at specific application scenarios (e-voting, e-auctions), different security guarantees (computational vs unconditional), different adversarial models (active vs passive, static vs ...
Loftus, Jacob J, Smart, Nigel P.
openaire +1 more source
The development of multi-party computation was one of the early achievements of theoretical cryptography. Since that time a number of papers have been published which look at specific application scenarios (e-voting, e-auctions), different security guarantees (computational vs unconditional), different adversarial models (active vs passive, static vs ...
Loftus, Jacob J, Smart, Nigel P.
openaire +1 more source
A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication
Journal of Intelligent & Fuzzy Systems, 2020Computation of complex mathematical problems are always a challenge of resource constrained clients. A client can outsource the computations to resource abundant cloud server for execution. But this arrangement brings many security and privacy challenges.
Malay Kumar +4 more
semanticscholar +1 more source

