[1] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83.
|
|
FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[2] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[3] |
WANG C , REN K . Secure and practical outsourcing of linear programming in cloud computing[C]// IEEE Infocom. 2011: 820-828.
|
[4] |
任艳丽, 谷大武, 蔡建兴 ,等. 隐私保护的可验证多元多项式外包计算方案[J]. 通信学报, 2015,36(8): 23-30.
|
|
REN Y L , GU D W , CAI J X ,et al. Verifiably private outsourcing scheme for multivariate polynomial evaluation[J]. Journal on Communications, 2015,36(8): 23-30.
|
[5] |
WANG C , REN K , WANG J ,et al. Harnessing the cloud for securely solving large-scale systems of linear equations[C]// The 31st International Conference on Distributed Computing Systems. 2011: 549-558.
|
[6] |
FIORE D , GENNARO R . Publicly verifiable delegation of large polynomials and matrix computations,with applications[C]// ACM Conference on Computer and Communications Security. 2012: 501-512.
|
[7] |
邬国欣 . 矩阵运算可验证安全外包计算协议的研究[D]. 西安:西安电子科技大学, 2014.
|
|
WU G X . On verifiable and secure outsourcing protocols for matrix operations[D]. Xi'an:Xidian University, 2014.
|
[8] |
ATALLAH M , FRIKKEN K . Securely outsourcing linear algebra computations[C]// ACM Symposium on Information,Computer and Communications Security. 2010: 48-59.
|
[9] |
ATALLAH M J , PANTAZOPOULOS K N , RICE J R ,et al. Secure outsourcing of scientific computations[J]. Adv Comput, 2001,54(1): 216-272.
|
[10] |
ATALLAH M J , FRIKKEN K . Securely outsourcing linear algebra computations[C]// The 5th ACM Symposium on Information,Computer and Communications Security. 2010: 48-59.
|
[11] |
PAYMAN M . Efficient and secure delegation of linear algebra[J]. IACR Cryptology Eprint Archive, 2011: 1-33.
|
[12] |
胡杏, 裴定一, 唐春明 ,等. 可验证安全外包矩阵计算及其应用[J]. 中国科学:信息科学, 2013,43(7): 842-852.
|
|
HU X , PEI D Y , TANG C M ,et al. Verifiable and secure outsourcing of matrix calculation and its application[J]. Scientia Sinca Informationis, 2013,43(7): 842-852.
|
[13] |
CHEN X , HUANG X , LI J ,et al. New algorithms for secure outsourcing of large-scale systems of linear equations[J]. IEEE Trans on Information Forensics and Security, 2015,10(1): 69-78.
|
[14] |
蔡建兴, 任艳丽 . 大型线性方程组求解的可验证外包算法[J]. 计算机应用研究, 2017(2).
|
|
CAI J X , REN Y L . Verifiable outsourcing algorithm for large-scale systems of linear equations[J]. Application Research of Computers, 2017(2).
|