2014
DOI: 10.1007/978-3-319-13257-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Secure and Verifiable Outsourcing of Matrix Multiplications

Abstract: With the emergence of cloud computing services, a resource-constrained client can outsource its computationally-heavy tasks to cloud providers. Because such service providers might not be fully trusted by the client, the need to verify integrity of the returned computation result arises. The ability to do so is called verifiable delegation or verifiable outsourcing. Furthermore, the data used in the computation may be sensitive and it is often desired to protect it from the cloud throughout the computation. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
28
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(28 citation statements)
references
References 41 publications
0
28
0
Order By: Relevance
“…Table 3 4 depicts a comparison of our proposal for matrix multiplication with the solution proposed by Fiore and Gennaro [11] and Zhang and Blanton [21].…”
Section: Related Workmentioning
confidence: 98%
See 3 more Smart Citations
“…Table 3 4 depicts a comparison of our proposal for matrix multiplication with the solution proposed by Fiore and Gennaro [11] and Zhang and Blanton [21].…”
Section: Related Workmentioning
confidence: 98%
“…Polynomial preparation d`1 exp in G1 2 pairing d-SBDH Yes [17] 2d n pairings nm exp in G1 n pairings co-CDH No [11] 2pn`mq exp in G1 n exp in GT DLin Zhang and Blanton 1 pairing n exp in G1 nm exp in G2 n pairings M-DDH Yes [21] m exp in G2 pn`1q exp in GT XDH pn`1q exp in GT Our scheme 2nm exp in G1 m exp in GT nm exp in G1 2 pairings co-CDH Yes m pairings n exp in G1 Table 4: Comparison of computation complexity with existing work for matrix multiplication correct computation [17], and uses polynomial commitments [16] to construct these signatures. Besides public verifiability, this solution implements public delegatability.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…All of these schemes can be divided into two categories. One is the calculation of general function [5] [6] [11] [12], and the other is the calculation of specific function [7] [8] [13] [14] [15] . In [5], Gennaro et al presented an outsourced computing scheme that is based on Yao's garbled circuits [16] and the fully homomorphism encryption (FHE).…”
Section: Related Workmentioning
confidence: 99%