[1] |
ARMBRUST M , FOX A , GRIFFITH R ,et al. Above the clouds:a berkeley view of cloud computing[R]. UCB/EECS-2009-28.Berkeley,USA:Electrical Engineering and Computer Sciences,University of California at Berkeley, 2009.
|
[2] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83.
|
|
FENFG D G , ZHANG M , ZHANG Y ,et al. Study of cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[3] |
罗军舟, 金嘉晖, 宋爱波 ,等. 云计算:体系架构与关键技术[J]. 通信学报, 2011,32(7): 3-21.
|
|
LUO J Z , JIN J H , SONG A B ,et al. Cloud computing:the architecture and key technologies[J]. Journal on Communications, 2011,32(7): 3-21.
|
[4] |
ATALLAH M J , KONSTANTINOS N ,et al. Secure outsourcing of some computations[R]. Indiana:Purdue University, 1996.
|
[5] |
ATALLAH M J , PANTAZOPOULOS K N , RICE J R ,et al. Secure outsourcing of scientific computations[J]. Advances in Computers, 2002,54(1): 215-272.
|
[6] |
ATALLAH M J , FRIKKEN K . Securely outsourcing linear algebra computations[C]// The 5th ACM Symposium on Information. 2010: 48-59.
|
[7] |
SHAMIRA . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[8] |
WANG C , REN K , WANG J . Harnessing the cloud for securely solving large-scale systems of linear equations[C]// The 31st International Conference on Distributed Computing Systems. 2011: 549-558.
|
[9] |
LEI X Y , LIAO X F , HUANG T W ,et al. Outsourcing large matrix inversion computation to a public cloud[J]. IEEE transactions on Cloud Computing, 2013,1(1): 78-87.
|
[10] |
MOTWANIR , RAGHAVANP . Randomized algorithms[M]. Cambridge: Cambridge University PressPress, 1995: 195-196.
|
[11] |
GENTRY C , . Fully homomorphic encryption using ideal lattices[C]// ACM Symposium on Theory of Computing. 2009: 169-178.
|
[12] |
靳方元 . 基于矩阵同态委托计算方案的研究与设计[D]. 苏州:苏州大学, 2013.
|
|
JIN F Y . The research and design based on matrix homomorphism entrust calculation scheme[D]. Suzhou:Soochow University, 2013.
|
[13] |
MOHASSEL P . Efficient and secure delegation of linear algebra.Cryptology ePrint Archive,Report 2011/605[DB/OL]. .
|
[14] |
胡杏, 裴定一, 唐春明 . 可验证安全外包矩阵计算及其应用[J]. 中国科学:信息科学, 2013,43(7): 842-852.
|
|
HU X , PEI D Y , TANG C M . The caculation and application of verifiable secure outsourcing matrix[J]. Scientia Sinica Informations, 2013,43(7): 842-852.
|
[15] |
邬国欣 . 矩阵运算可验证安全外包计算协议的研究[D]. 西安:西安电子科技大学, 2014.
|
|
WU G X . Study of outsourcing matrix matrix verifiable security outsourcing computation protocol[D]. Xi’an:Xidian University, 2014.
|
[16] |
罗文俊, 李祥 . 多方安全矩阵乘法协议及应用[J]. 计算机学报, 2005,28(7): 1230-1235.
|
|
LUO W J , LI X . Multilateral security protocol and application of matrix multiplication[J]. Chinese Journal of Computer, 2005,28(7): 1230-1235.
|
[17] |
邵志毅 . 云环境下的隐私保护计算[D]. 西安:陕西师范大学, 2015.
|
|
SHAO Z Y . Privacy protection under the cloud environment[D]. Xi’an:Shaanxi Normal University, 2015.
|
[18] |
YANG B , YU Y , YANG C H . A secure scalar product protocol against malicious adversaries[J]. Journal of Computer Science &Technology, 2013,28(1): 152-158.
|
[19] |
王开荣, 杨大地 . 应用数值分析[M]. 北京: 高等教育出版社, 2010.
|
|
WANG K R , YANG D D . Analysis of applied values[M]. Beijing: Higher Education PressPress, 2010.
|
[20] |
ZHANG J , ZHU Y , JIN F . Practical and secure outsourcing of linear algebra in the cloud[C]// International Conference on Advanced Cloud and Big Data. 2013: 81-87.
|