2016 IEEE Global Communications Conference (GLOBECOM) 2016
DOI: 10.1109/glocom.2016.7841783
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…There are also several works such as [36][37][38][39] addressing the result integrity of matrix multiplication in public cloud using cryptographic methods. Since they do not assume any restricting rules on the cloud side, they can be applied on the MapReduce model as well.…”
Section: Related Workmentioning
confidence: 99%
“…There are also several works such as [36][37][38][39] addressing the result integrity of matrix multiplication in public cloud using cryptographic methods. Since they do not assume any restricting rules on the cloud side, they can be applied on the MapReduce model as well.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function. Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function.…”
Section: Related Workmentioning
confidence: 99%
“…Gennaro et al 2 first introduced and formalized the non-interactive verifiable outsourced computation. Subsequent works for verifiable computation of the general function include other works, 6,12,22,23 and the previous works [24][25][26][27][28] concentrate on schemes to improve the efficiency for computing the specific function. Several previous schemes only allow one specific client to privately verify the result during each round of computational process, which has some inherent limitations as introduced above.…”
Section: Related Workmentioning
confidence: 99%
“…They compared their scheme functionalities with existing works, such as Fiore's [7], Li's [16], and Jia's schema [11]. Zhang et al [23] proved that their schema is more efficient in terms of functionality as well as computation, storage, and communication overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [23] presented an outsourcing computation schema in an amortized model for matrix multiplication of two arbitrary matrices that meet the requirements for both security and efficiency. They compared their scheme functionalities with existing works, such as Fiore's [7], Li's [16], and Jia's schema [11].…”
Section: Related Workmentioning
confidence: 99%