Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
A comprehensive survey on secure outsourced computation and its applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …
for local devices (with limited sources) to implement large-scale data processing. Therefore …
Efficient and secure outsourcing scheme for RSA decryption in Internet of Things
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
Sparse matrix masking-based non-interactive verifiable (outsourced) computation, revisited
L Zhao, L Chen - IEEE transactions on dependable and secure …, 2018 - ieeexplore.ieee.org
A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a
resource-constrained client to outsource expensive and sensitive workloads to …
resource-constrained client to outsource expensive and sensitive workloads to …
Dsos: a distributed secure outsourcing system for edge computing service in iot
Edge computing can help the resource-constrained Internet of Things (IoT) devices to
perform some complex tasks. Edge computing has many advantages, such as the …
perform some complex tasks. Edge computing has many advantages, such as the …
Secure distributed outsourcing of large-scale linear systems
D Feng, F Zhou, D He, M Guo… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
Solving the system of linear algebraic equations (LAE) is the most well known and probably
the most important of all numerical computations involving real numbers. Researchers have …
the most important of all numerical computations involving real numbers. Researchers have …
Secure and verifiable outsourcing of large-scale matrix inversion without precondition in cloud computing
Large-scale matrix computation requires a lot of computing resources, but the emergence of
cloud computing provides resource-limited users with an economical solution, namely …
cloud computing provides resource-limited users with an economical solution, namely …
A secure algorithm for outsourcing matrix multiplication computation in the cloud
S Fu, Y Yu, M Xu - Proceedings of the Fifth ACM international workshop …, 2017 - dl.acm.org
Matrix multiplication computation (MMC) is a common scientific and engineering
computational task. But such computation involves enormous computing resources for large …
computational task. But such computation involves enormous computing resources for large …
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server
Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-
constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing …
constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing …
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud
Cloud-assisted computation empowers resource-constrained clients to efficiently tackle
computationally intensive tasks by outsourcing them to resource-rich cloud servers. In the …
computationally intensive tasks by outsourcing them to resource-rich cloud servers. In the …