[1] |
LI H W , LIN X D , YANG H M ,et al. EPPDR:an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(8): 2053-2064.
|
[2] |
LI J , LI J W , CHEN X F ,et al. Identity-based encryption with outsourced revocation in cloud computing[J]. IEEE Transactions on Computers, 2015,64(2): 425-437.
|
[3] |
LI H W , YANG Y , LUAN T H ,et al. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(3): 312-325.
|
[4] |
GENNARO R , GENTRY C , PARNO B . Non-interactive verifiable computing[J]. Heidelberg:Springer, 2009.
|
[5] |
JOSHI K P , YESHA Y , FININ T . Automating cloud services life cycle through semantic technologies[J]. IEEE Transactions on Services Computing, 2014,7(1): 109-122.
|
[6] |
LI J , ZHANG Y H , CHEN X F ,et al. Secure attribute-based data sharing for resource-limited users in cloud computing[J]. Computers & Security, 2018,72: 1-12.
|
[7] |
LI P , LI J , HUANG Z G ,et al. Privacy-preserving outsourced classification in cloud computing[J]. Cluster Computing, 2018,21(1): 277-286.
|
[8] |
LI P , LI J , HUANG Z A . Multi-key privacy-preserving deep learning in cloud computing[J]. Future Generation Computer Systems, 2017,74: 76-85.
|
[9] |
PAIK I , CHEN W H , HUHNS M N . A scalable architecture for automatic service composition[J]. IEEE Transactions on Services Computing, 2014,7(1): 82-95.
|
[10] |
PARK K W , HAN J , CHUNG J ,et al. THEMIS:a mutually verifiable billing system for the cloud computing environment[J]. IEEE Transactions on Services Computing, 2013,6(3): 300-313.
|
[11] |
WANG C , WANG Q , REN K ,et al. Toward secure and dependable storage services in cloud computing[J]. IEEE Transactions on Services Computing, 2012,5(2): 220-232.
|
[18] |
JIA K , LI H W , LIU D X ,et al. Enabling efficient and secure outsourcing of large matrix multiplications[C]// Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE Press, 2016: 1-6.
|
[19] |
ELKHIYAOUI K , ?NEN M , AZRAOUI M ,et al. Efficient techniques for publicly verifiable delegation of computation[C]// Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York:ACM Press, 2016: 119-128.
|
[20] |
ZHANG Y H , BLANTON M . Efficient secure and verifiable outsourcing of matrix multiplications[C]// International Conference on Information Security. Cham:Springer, 2014: 158-178.
|
[21] |
ZHANG L F , SAFAVI-NAINI R . Batch verifiable computation of outsourced functions[J]. Designs,Codes and Cryptography, 2015,77(2): 563-585.
|
[22] |
SUN Y J , YU Y , LI X X ,et al. Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations[C]// Australasian Conference on Information Security and Privacy. Cham:Springer, 2016: 293-309.
|
[23] |
LI H W , ZHANG S M , LUAN T H ,et al. Enabling efficient publicly verifiable outsourcing computation for matrix multiplication[C]// Proceedings of 2015 International Telecommunication Networks and Applications Conference (ITNAC). Piscataway:IEEE Press, 2016: 44-50.
|
[24] |
ZHANG L F , SAFAVI-NAINI R . Verifiable delegation of computations with storage-verification trade-off[C]// European Symposium on Research in Computer Security. Cham:Springer, 2014: 112-129.
|
[25] |
ZHANG X Y , JIANG T , LI K C ,et al. New publicly verifiable computation for batch matrix multiplication[J]. Information Sciences, 2019(479): 664-678.
|
[26] |
SALINAS S , LUO C Q , CHEN X H ,et al. Efficient secure outsourcing of large-scale linear systems of equations[C]// Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM). Piscataway:IEEE Press, 2015: 1035-1043.
|
[27] |
BENABBAS S , GENNARO R , VAHLIS Y . Verifiable Delegation of Computation over Large Datasets[C]// Annual Cryptology Conference. Heidelberg:Springer, 2011: 111-131.
|
[12] |
WANG C , ZHANG B S , REN K ,et al. Privacy-assured outsourcing of image reconstruction service in cloud[J]. IEEE Transactions on Emerging Topics in Computing, 2013,1(1): 166-177.
|
[13] |
ATALLAH M J , FRIKKEN K B . Securely outsourcing linear algebra computations[C]// Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2010: 48-59.
|
[14] |
ATALLAH M J , FRIKKEN K B , WANG S M . Private outsourcing of matrix multiplication over closed semi-rings[C]// Proceedings of the International Conference on Security and Cryptography. San Francisco:SciTePress, 2012: 136-144.
|
[15] |
FIORE D , GENNARO R . Publicly verifiable delegation of large polynomials and matrix computations,with applications[C]// Proceedings of the 2012 ACM conference on Computer and communications security. New York:ACM Press, 2012: 501-512.
|
[16] |
MOHASSEL P . Efficient and secure delegation of linear algebra[J]. IACR Cryptology EPrint Archive, 2011:605.
|
[17] |
YAO A C . Protocols for secure computations[C]// Proceedings of 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982). Piscataway:IEEE Press, 2008: 160-164.
|