Telecommunications Science ›› 2023, Vol. 39 ›› Issue (12): 110-121.doi: 10.11959/j.issn.1000-0801.2023251
• Research and Development • Previous Articles
Shoudao SUN1, Shen YANG1, Yiheng CHEN1, Qiang WANG2
Revised:
2023-12-10
Online:
2023-12-01
Published:
2023-12-01
Supported by:
CLC Number:
Shoudao SUN, Shen YANG, Yiheng CHEN, Qiang WANG. Secure efficient privacy-preserving publicly verifiable outsourced computation scheme for matrix multiplication[J]. Telecommunications Science, 2023, 39(12): 110-121.
[1] | LI H W , LIN X D , YANG H M ,et al. EPPDR:an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(8): 2053-2064. |
[2] | LI J , LI J W , CHEN X F ,et al. Identity-based encryption with outsourced revocation in cloud computing[J]. IEEE Transactions on Computers, 2015,64(2): 425-437. |
[3] | LI H W , YANG Y , LUAN T H ,et al. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(3): 312-325. |
[4] | GENNARO R , GENTRY C , PARNO B . Non-interactive verifiable computing[J]. Heidelberg:Springer, 2009. |
[5] | JOSHI K P , YESHA Y , FININ T . Automating cloud services life cycle through semantic technologies[J]. IEEE Transactions on Services Computing, 2014,7(1): 109-122. |
[6] | LI J , ZHANG Y H , CHEN X F ,et al. Secure attribute-based data sharing for resource-limited users in cloud computing[J]. Computers & Security, 2018,72: 1-12. |
[7] | LI P , LI J , HUANG Z G ,et al. Privacy-preserving outsourced classification in cloud computing[J]. Cluster Computing, 2018,21(1): 277-286. |
[8] | LI P , LI J , HUANG Z A . Multi-key privacy-preserving deep learning in cloud computing[J]. Future Generation Computer Systems, 2017,74: 76-85. |
[9] | PAIK I , CHEN W H , HUHNS M N . A scalable architecture for automatic service composition[J]. IEEE Transactions on Services Computing, 2014,7(1): 82-95. |
[10] | PARK K W , HAN J , CHUNG J ,et al. THEMIS:a mutually verifiable billing system for the cloud computing environment[J]. IEEE Transactions on Services Computing, 2013,6(3): 300-313. |
[11] | WANG C , WANG Q , REN K ,et al. Toward secure and dependable storage services in cloud computing[J]. IEEE Transactions on Services Computing, 2012,5(2): 220-232. |
[18] | JIA K , LI H W , LIU D X ,et al. Enabling efficient and secure outsourcing of large matrix multiplications[C]// Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE Press, 2016: 1-6. |
[19] | ELKHIYAOUI K , ?NEN M , AZRAOUI M ,et al. Efficient techniques for publicly verifiable delegation of computation[C]// Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York:ACM Press, 2016: 119-128. |
[20] | ZHANG Y H , BLANTON M . Efficient secure and verifiable outsourcing of matrix multiplications[C]// International Conference on Information Security. Cham:Springer, 2014: 158-178. |
[21] | ZHANG L F , SAFAVI-NAINI R . Batch verifiable computation of outsourced functions[J]. Designs,Codes and Cryptography, 2015,77(2): 563-585. |
[22] | SUN Y J , YU Y , LI X X ,et al. Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations[C]// Australasian Conference on Information Security and Privacy. Cham:Springer, 2016: 293-309. |
[23] | LI H W , ZHANG S M , LUAN T H ,et al. Enabling efficient publicly verifiable outsourcing computation for matrix multiplication[C]// Proceedings of 2015 International Telecommunication Networks and Applications Conference (ITNAC). Piscataway:IEEE Press, 2016: 44-50. |
[24] | ZHANG L F , SAFAVI-NAINI R . Verifiable delegation of computations with storage-verification trade-off[C]// European Symposium on Research in Computer Security. Cham:Springer, 2014: 112-129. |
[25] | ZHANG X Y , JIANG T , LI K C ,et al. New publicly verifiable computation for batch matrix multiplication[J]. Information Sciences, 2019(479): 664-678. |
[26] | SALINAS S , LUO C Q , CHEN X H ,et al. Efficient secure outsourcing of large-scale linear systems of equations[C]// Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM). Piscataway:IEEE Press, 2015: 1035-1043. |
[27] | BENABBAS S , GENNARO R , VAHLIS Y . Verifiable Delegation of Computation over Large Datasets[C]// Annual Cryptology Conference. Heidelberg:Springer, 2011: 111-131. |
[12] | WANG C , ZHANG B S , REN K ,et al. Privacy-assured outsourcing of image reconstruction service in cloud[J]. IEEE Transactions on Emerging Topics in Computing, 2013,1(1): 166-177. |
[13] | ATALLAH M J , FRIKKEN K B . Securely outsourcing linear algebra computations[C]// Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2010: 48-59. |
[14] | ATALLAH M J , FRIKKEN K B , WANG S M . Private outsourcing of matrix multiplication over closed semi-rings[C]// Proceedings of the International Conference on Security and Cryptography. San Francisco:SciTePress, 2012: 136-144. |
[15] | FIORE D , GENNARO R . Publicly verifiable delegation of large polynomials and matrix computations,with applications[C]// Proceedings of the 2012 ACM conference on Computer and communications security. New York:ACM Press, 2012: 501-512. |
[16] | MOHASSEL P . Efficient and secure delegation of linear algebra[J]. IACR Cryptology EPrint Archive, 2011:605. |
[17] | YAO A C . Protocols for secure computations[C]// Proceedings of 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982). Piscataway:IEEE Press, 2008: 160-164. |
[1] | Xue HAN. Damage toughness assessment method of power backbone communication network based on power big data [J]. Telecommunications Science, 2023, 39(5): 136-143. |
[2] | Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG. Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks [J]. Telecommunications Science, 2022, 38(6): 71-81. |
[3] | Wenjuan XING, Bo LEI, Qianying ZHAO. Development status and trend prospect of computing power infrastructure [J]. Telecommunications Science, 2022, 38(6): 51-61. |
[4] | Jiangxing WU. Revolution of the development paradigm of network technology system—network of networks [J]. Telecommunications Science, 2022, 38(6): 3-12. |
[5] | Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN. Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing [J]. Telecommunications Science, 2022, 38(12): 1-10. |
[6] | Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG. Big data security features and operation practices [J]. Telecommunications Science, 2021, 37(5): 160-169. |
[7] | Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG. A lightweight privacy-preserving truth discovery mechanism for IoT [J]. Telecommunications Science, 2021, 37(5): 124-132. |
[8] | Shuangxing WANG, Jintang LUO, Lisha SHUAI, Jiamin ZHANG, Min ZHANG, Xiaolong YANG. Cloud data anonymous assured deletion approach based on blockchain [J]. Telecommunications Science, 2021, 37(3): 90-104. |
[9] | Jian XU,Li JIN. A quantifiable cloud computing platform security evaluation model [J]. Telecommunications Science, 2020, 36(7): 163-167. |
[10] | Sining LUO,Hualong WANG,Hongyu LI,Wei PENG. Improved ant colony algorithm based cloud computing user task scheduling algorithm [J]. Telecommunications Science, 2020, 36(2): 95-100. |
[11] | Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN. Computing network:a new multi-access edge computing [J]. Telecommunications Science, 2019, 35(9): 44-51. |
[12] | Zelin LU,Qiangzhi LI. Evolutionary logic and operational mechanism of E-commerce platform [J]. Telecommunications Science, 2019, 35(7): 152-158. |
[13] | Yongmei GAO,Guanjie CHENG. Data-intensive service deployment based on edge computing [J]. Telecommunications Science, 2019, 35(7): 87-99. |
[14] | Zhilan HUANG,Yongbing FAN,Ning FAN,Nan CHEN,Linze WU,Baohong LIN. Solution and key technology of integrating vFW in cloud platform [J]. Telecommunications Science, 2019, 35(5): 140-148. |
[15] | Youkang ZHU,Guangxue YUE,Xiaohui YANG,Jiansheng LIU. A survey on edge computing offloading [J]. Telecommunications Science, 2019, 35(4): 74-94. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|