A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Secure outsourced computation

J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of
theoretical cryptography. Since that time a number of papers have been published which …

SOCI: A toolkit for secure outsourced computation on integers

B Zhao, J Yuan, X Liu, Y Wu, HH Pang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure outsourced computation is a key technique for protecting data security and privacy in
the cloud. Although fully homomorphic encryption (FHE) enables computations over …

Efficient secure outsourcing of large-scale convex separable programming for big data

W Liao, C Luo, S Salinas, P Li - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Big data has become a key basis of innovation and intelligence, potentially making our lives
more convenient and bringing new opportunities to the modern society. Towards this goal, a …

[图书][B] Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised …

M Brenner, K Rohloff, J Bonneau, A Miller, PYA Ryan… - 2017 - books.google.com
The hype over the cloud and recent disclosures show there is demand for secure and
practical computing technologies. The WAHC workshop addresses the challenge in safely …

Privacy-preserving outsourced calculation toolkit in the cloud

X Liu, RH Deng, KKR Choo, Y Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a privacy-preserving outsourced calculation toolkit, Pockit,
designed to allow data owners to securely outsource their data to the cloud for storage. The …

Twin Clouds: Secure Cloud Computing with Low Latency: (Full Version)

S Bugiel, S Nürnberger, AR Sadeghi… - … : 12th IFIP TC 6/TC 11 …, 2011 - Springer
Cloud computing promises a cost effective enabling technology to outsource storage and
massively parallel computations. However, existing approaches for provably secure …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Reaction attack on outsourced computing with fully homomorphic encryption schemes

Z Zhang, T Plantard, W Susilo - … Security and Cryptology-ICISC 2011: 14th …, 2012 - Springer
Outsourced computations enable more efficient solutions towards practical problems that
require major computations. Nevertheless, users' privacy remains as a major challenge, as …

Lightning-fast and privacy-preserving outsourced computation in the cloud

X Liu, RH Deng, P Wu, Y Yang - Cybersecurity, 2020 - Springer
In this paper, we propose a framework for lightning-fast privacy-preserving outsourced
computation framework in the cloud, which we refer to as LightCom. Using LightCom, a user …