Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. At p...
Saved in:
Main Authors: | ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024035 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
by: Xing-lan ZHANG, et al.
Published: (2017-06-01) -
Dual verifiable cloud storage scheme based on blockchain
by: Tao FENG, et al.
Published: (2021-12-01) -
Efficient certificateless searchable encryption scheme with verifiability
by: Xinhua CUI, et al.
Published: (2023-08-01) -
Verifiable special threshold secret sharing scheme based on eigenvalue
by: Yanshuo ZHANG, et al.
Published: (2018-08-01) -
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
by: Rui SUN, et al.
Published: (2016-11-01)