Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression
Linear Regression (LR) is a classical machine learning algorithm which has many
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …
Lightweighted secure searching over public-key ciphertexts for edge-cloud-assisted industrial IoT devices
For the industrial Internet of Things (IIoT), public-key encryption with keyword search (PEKS)
is a type of applicable and promising encryption technique to maintain the data stored in …
is a type of applicable and promising encryption technique to maintain the data stored in …
Blockchain-aided privacy-preserving outsourcing algorithms of bilinear pairings for internet of things devices
Bilinear pairing is a fundamental operation that is widely used in cryptographic algorithms
(eg, identity-based cryptographic algorithms) to secure IoT applications. Nonetheless, the …
(eg, identity-based cryptographic algorithms) to secure IoT applications. Nonetheless, the …
Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
Efficient and secure outsourcing scheme for RSA decryption in Internet of Things
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …
How to securely outsource finding the min-cut of undirected edge-weighted graphs
Finding min-cut is a fundamental operation in graph theory. It has been widely used in many
applications such as image segmentation and network partition. However, solving the min …
applications such as image segmentation and network partition. However, solving the min …
Secure outsourced decryption for FHE-based privacy-preserving cloud computing
X Ma, C Li, Y Hu, Y Tao, Y Jiang, Y Li, F Kong… - Journal of Information …, 2024 - Elsevier
The demand for processing vast volumes of data has surged dramatically due to the
advancement of machine learning technology. Large-scale data processing necessitates …
advancement of machine learning technology. Large-scale data processing necessitates …
Secure outsourcing for normalized cuts of large-scale dense graph in internet of things
With popularity and growth of cloud computing, outsourcing computation, as an important
cloud service, has been applied in the field of academic and industry. It allows the resource …
cloud service, has been applied in the field of academic and industry. It allows the resource …
[BOOK][B] Introduction to secure outsourcing computation
X Chen - 2016 - Springer
With the rapid development of cloud computing, the enterprises and individuals can
outsource their sensitive data into the cloud server where they can enjoy high quality data …
outsource their sensitive data into the cloud server where they can enjoy high quality data …
How to securely outsource the inversion modulo a large composite number
Modular inversion is one of the most basic computations in algorithmic number theory. When
it comes to cryptosystems, this computation is very time-consuming since the modulus is …
it comes to cryptosystems, this computation is very time-consuming since the modulus is …