Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression

H Zhang, P Gao, J Yu, J Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Linear Regression (LR) is a classical machine learning algorithm which has many
applications in the cyber physical social systems (CPSS) to shape and simplify the way we …

Lightweighted secure searching over public-key ciphertexts for edge-cloud-assisted industrial IoT devices

W Wang, P Xu, D Liu, LT Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For the industrial Internet of Things (IIoT), public-key encryption with keyword search (PEKS)
is a type of applicable and promising encryption technique to maintain the data stored in …

Blockchain-aided privacy-preserving outsourcing algorithms of bilinear pairings for internet of things devices

H Zhang, L Tong, J Yu, J Lin - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Bilinear pairing is a fundamental operation that is widely used in cryptographic algorithms
(eg, identity-based cryptographic algorithms) to secure IoT applications. Nonetheless, the …

Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things

H Zhang, J Yu, C Tian, G Xu, P Gao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …

Efficient and secure outsourcing scheme for RSA decryption in Internet of Things

H Zhang, J Yu, C Tian, L Tong, J Lin… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Rivest-Shamir-Adleman (RSA) is one of the widely deployed public-key algorithms. Yet, its
decryption facet is very time consuming for resource-constrained Internet-of-Thing (IoT) …

How to securely outsource finding the min-cut of undirected edge-weighted graphs

P Zhao, J Yu, H Zhang, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Finding min-cut is a fundamental operation in graph theory. It has been widely used in many
applications such as image segmentation and network partition. However, solving the min …

Secure outsourced decryption for FHE-based privacy-preserving cloud computing

X Ma, C Li, Y Hu, Y Tao, Y Jiang, Y Li, F Kong… - Journal of Information …, 2024 - Elsevier
The demand for processing vast volumes of data has surged dramatically due to the
advancement of machine learning technology. Large-scale data processing necessitates …

Secure outsourcing for normalized cuts of large-scale dense graph in internet of things

H Li, F Kong, J Yu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With popularity and growth of cloud computing, outsourcing computation, as an important
cloud service, has been applied in the field of academic and industry. It allows the resource …

[BOOK][B] Introduction to secure outsourcing computation

X Chen - 2016 - Springer
With the rapid development of cloud computing, the enterprises and individuals can
outsource their sensitive data into the cloud server where they can enjoy high quality data …

How to securely outsource the inversion modulo a large composite number

Q Su, J Yu, C Tian, H Zhang, R Hao - Journal of Systems and Software, 2017 - Elsevier
Modular inversion is one of the most basic computations in algorithmic number theory. When
it comes to cryptosystems, this computation is very time-consuming since the modulus is …