Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2 Hits in 2.7 sec

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing [article]

Kai Zhou, M. H. Afifi, Jian Ren
2016 arXiv   pre-print
In this paper, we address the problem of secure outsourcing of exponentiation operations to one single untrusted server.  ...  However, the exponential operations are considered prohibitively expensive for resource-constrained mobile devices.  ...  Thus, we propose a Secure Outsourcing Scheme for general Exponential (ExpSOS) operations. The proposed ExpSOS is based on ring homomorphism.  ... 
arXiv:1602.08472v1 fatcat:q6abi7kiyzbzlhdkztxgvzpl54

Security Outsourcing Algorithms by Unimodular Matrix Encryption Method

ZHANG Shengxia, TIAN Chengliang
2020 Jisuanji kexue yu tansuo  
The cloud computes it and returns the results to the client. The client decrypts and verifies it.  ...  The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied  ...  ACM Computing Surveys, 2018, 51(2): 31. [4] Zhou K, Afifi M H, Ren J. ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing[J].  ... 
doi:10.3778/j.issn.1673-9418.1901011 doaj:414897c69bcd4dd68ef8e2a02466df3b fatcat:4c4inbgltjfevjs4rbahfh7w4u