2013
DOI: 10.1109/tpds.2012.206
|View full text |Cite
|
Sign up to set email alerts
|

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

Abstract: Abstract-Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern. In this paper, we present a secure outsourcing mechanism for solving large-scale systems of linear equations (LE) in cloud. Because applying traditional approaches like Gaussian elimination or LU decomposition (aka. direct method) to such large-scal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
66
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 136 publications
(67 citation statements)
references
References 37 publications
(67 reference statements)
1
66
0
Order By: Relevance
“…To avoid applying FHE and promote efficiency, a lot of papers [9][10][11][12][13][14][15] focused on VC schemes for various kinds of computation and had achieved outstanding results.…”
Section: Verifiable Computation Verifiable Computation (Vc)mentioning
confidence: 99%
“…To avoid applying FHE and promote efficiency, a lot of papers [9][10][11][12][13][14][15] focused on VC schemes for various kinds of computation and had achieved outstanding results.…”
Section: Verifiable Computation Verifiable Computation (Vc)mentioning
confidence: 99%
“…al. [6] introduced a secure outsourcing tool for solving the large-scale system of the linear equations, which is based on the iterative approaches. However, it needs multiround co-operations between the client and the cloud server and thus is quite impractical.…”
Section: Related Workmentioning
confidence: 99%
“…We compare the proposed algorithm with Wang et al's algorithm [22] and Chen et al's algorithm [11]. We denote by M an operation of multiplication, by DE a decryption of Paillier encryption, by L the round of iteration for algorithm [22], and by l a constant.…”
Section: B Comparison Of Three Schemesmentioning
confidence: 99%
“…We denote by M an operation of multiplication, by DE a decryption of Paillier encryption, by L the round of iteration for algorithm [22], and by l a constant. Other operations such as vector additions are omitted in both algorithms.…”
Section: B Comparison Of Three Schemesmentioning
confidence: 99%
See 1 more Smart Citation