Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Efficient and secure outsourcing scheme for RSA decryption in Internet of Things

H Zhang, J Yu, C Tian, L Tong, J Lin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …

Sparse matrix masking-based non-interactive verifiable (outsourced) computation, revisited

L Zhao, L Chen - IEEE transactions on dependable and secure …, 2018 - ieeexplore.ieee.org
A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a
resource-constrained client to outsource expensive and sensitive workloads to …

Dsos: a distributed secure outsourcing system for edge computing service in iot

H Li, J Yu, J Fan, Y Pi - IEEE Transactions on Systems, Man …, 2022 - ieeexplore.ieee.org
Edge computing can help the resource-constrained Internet of Things (IoT) devices to
perform some complex tasks. Edge computing has many advantages, such as the …

Secure distributed outsourcing of large-scale linear systems

D Feng, F Zhou, D He, M Guo… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
Solving the system of linear algebraic equations (LAE) is the most well known and probably
the most important of all numerical computations involving real numbers. Researchers have …

Secure and verifiable outsourcing of large-scale matrix inversion without precondition in cloud computing

Z Chen, A Fu, K Xiao, M Su, Y Yu… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Large-scale matrix computation requires a lot of computing resources, but the emergence of
cloud computing provides resource-limited users with an economical solution, namely …

A secure algorithm for outsourcing matrix multiplication computation in the cloud

S Fu, Y Yu, M Xu - Proceedings of the Fifth ACM international workshop …, 2017 - dl.acm.org
Matrix multiplication computation (MMC) is a common scientific and engineering
computational task. But such computation involves enormous computing resources for large …

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server

A Fu, Y Zhu, G Yang, S Yu, Y Yu - Cluster Computing, 2018 - Springer
Modular exponentiation is an expensive discrete-logarithm operation, difficult for resource-
constrained users to perform locally. Fortunately, thanks to burgeoning cloud computing …

How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud

C Tian, J Yu, P Meng, G Zhang, W Tian… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cloud-assisted computation empowers resource-constrained clients to efficiently tackle
computationally intensive tasks by outsourcing them to resource-rich cloud servers. In the …