4.6 Article

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization

Anmin Fu et al.

Summary: This paper presents a novel outsourced scheme for Non-negative Matrix Factorization (O-NMF) to alleviate clients' computing burden and address data privacy and verification issues when outsourcing NMF.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)

Jia Duan et al.

Summary: This work addresses the issue of secure outsourcing large-scale nonnegative matrix factorization (NMF) to the cloud by proposing a scheme that allows clients to verify results with small overhead. The protection of input matrix is achieved through a random permutation and scaling encryption mechanism, and a single-round verification strategy is proposed based on the iterative nature of NMF computation. Theoretical and experimental results demonstrate the superior performance of the proposed scheme.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Chemistry, Analytical

On the Security and Privacy Challenges of Virtual Assistants

Tom Bolton et al.

Summary: Since the introduction of Siri by Apple, virtual assistants have become increasingly popular. Concerns over security and privacy issues have motivated research in this area, highlighting the need for advancements in voice authentication and compliance with privacy regulations.

SENSORS (2021)

Article Computer Science, Information Systems

Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption

Mingyang Song et al.

Summary: This paper presents a generic blockchain-based framework for secure computation outsourcing and proposes an algorithm for secure outsourcing of polynomial multiplication, reducing local computation cost to O(n). By integrating the algorithm into fully homomorphic encryption, a more efficient outsourcing scheme is achieved. Security analysis demonstrates privacy protection against passive attackers and cheating detection against active attackers.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption

Haoran Zong et al.

Summary: This paper investigates secure outsourced computation of matrix determinant based on fully homomorphic encryption and proposes an efficient secure outsourced computation scheme. Experimental results show that the scheme efficiently computes the matrix determinant and can be easily applied as a submodule in high-level applications.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

TFHE: Fast Fully Homomorphic Encryption Over the Torus

Ilaria Chillotti et al.

JOURNAL OF CRYPTOLOGY (2020)

Article Computer Science, Information Systems

Blockchain-based system for secure outsourcing of bilinear pairings

Chao Lin et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields

Qiang Zhou et al.

INFORMATION SCIENCES (2020)

Article Engineering, Electrical & Electronic

A lightweight portable intrusion detection communication system for auditing applications

Carl Nykvist et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Computer Science, Hardware & Architecture

Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud

Qianqian Su et al.

COMPUTER JOURNAL (2020)

Article Computer Science, Artificial Intelligence

A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication

Malay Kumar et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2020)

Article Computer Science, Information Systems

Secure outsourcing of large matrix determinant computation

Jiayang Liu et al.

FRONTIERS OF COMPUTER SCIENCE (2020)

Article Genetics & Heredity

Privacy-preserving approximate GWAS computation based on homomorphic encryption

Duhyeong Kim et al.

BMC MEDICAL GENOMICS (2020)

Article Computer Science, Information Systems

Secure and Efficient Protocol for Outsourcing Large-Scale Matrix Multiplication to the Cloud

Yu Wu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Key-policy attribute-based encryption against continual auxiliary input leakage

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

Shengxia Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes

Tongchen Shen et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server

Anmin Fu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Lightweight scheme of secure outsourcing SVD of a large matrix on cloud

Chakan Pramkaew et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Letter Computer Science, Information Systems

New algorithms for verifiable outsourcing of bilinear pairings

Yanli Ren et al.

SCIENCE CHINA-INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

Cloud Computing Service: The Case of Large Matrix Determinant Computation

Xinyu Lei et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)