A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing
[article]
2016
arXiv
pre-print
In this paper, we address the problem of secure outsourcing of exponentiation operations to one single untrusted server. ...
However, the exponential operations are considered prohibitively expensive for resource-constrained mobile devices. ...
Thus, we propose a Secure Outsourcing Scheme for general Exponential (ExpSOS) operations. The proposed ExpSOS is based on ring homomorphism. ...
arXiv:1602.08472v1
fatcat:q6abi7kiyzbzlhdkztxgvzpl54
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
2020
Jisuanji kexue yu tansuo
The cloud computes it and returns the results to the client. The client decrypts and verifies it. ...
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied ...
ACM Computing Surveys, 2018, 51(2): 31. [4] Zhou K, Afifi M H, Ren J. ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing[J]. ...
doi:10.3778/j.issn.1673-9418.1901011
doaj:414897c69bcd4dd68ef8e2a02466df3b
fatcat:4c4inbgltjfevjs4rbahfh7w4u