Learning-based joint optimization of energy delay and privacy in multiple-user edge-cloud collaboration MEC systems

G Zhang, S Ni, P Zhao - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The emergence of mobile edge computing (MEC) enables resource-limited user devices to
run computation-intensive applications with the aid of edge server, but the untrustworthiness …

Publicly verifiable homomorphic secret sharing for polynomial evaluation

X Chen, LF Zhang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
There are two main security concerns in outsourcing computations. One is how to protect the
privacy of the outsourced data, and the other is how to ensure the correctness of the …

[HTML][HTML] Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing

Y Tian, T Zhou, X Zhou, W Zhong, X Yang - Journal of King Saud University …, 2024 - Elsevier
Compared with traditional wireless sensor networks, mobile crowdsensing networks have
advantages of low cost, easy maintenance, and high scalability, which will play a role in city …

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization

J Chen, H Zheng, T Liu, J Liu, Y Cheng… - … on Dependable and …, 2024 - ieeexplore.ieee.org
With the development of deep learning processors and accelerators, deep learning models
have been widely deployed on edge devices as part of the Internet of Things. Edge device …

[PDF][PDF] 同态签名研究综述

吴华麟, 陈文彬, 高崇志, 刘淼… - Journal of Cryptologic …, 2021 - jcr.cacrnet.org.cn
介绍同态签名的研究背景, 意义和当前现状, 描述了同态签名方案的基本概念,
分析了同态签名方案所具有的安全性等其他相关特性, 以及密码学基础. 系统地论述了目前同态 …

Homomorphic trapdoors for identity-based and group signatures

B Ganesh, A Vangujar, A Umrani… - Cryptology ePrint …, 2023 - eprint.iacr.org
Group signature (GS) schemes are an important primitive in cryptography that provides
anonymity and traceability for a group of users. In this paper, we propose a new approach to …

Edge Deep Learning Model Protection via Neuron Authorization

J Chen, H Zheng, T Liu, R Li, Y Cheng… - arXiv preprint arXiv …, 2023 - arxiv.org
With the development of deep learning processors and accelerators, deep learning models
have been widely deployed on edge devices as part of the Internet of Things. Edge device …

Verifiable Homomorphic Secret Sharing for Machine Learning Classifiers

X Chen - IEEE Access, 2023 - ieeexplore.ieee.org
When using machine learning classifiers to classify data in cloud computing, it is crucial to
maintain data privacy and ensure the correctness of classification results. To address these …

An Efficient HPRA‐Based Multiclient Verifiable Computation: Transform and Instantiation

S Xu - Security and Communication Networks, 2021 - Wiley Online Library
Choi, Katz, Kumaresan, and Cid put forward the conception of multiclient noninteractive
verifiable computation (MVC), enabling a group of clients to outsource computation of a …

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

X Wang, Z Cao, Z Liu, K Liang - European Symposium on Research in …, 2022 - Springer
Abstract Gordon et al.(TCC 2015) systematically studied the security of Multi-client Verifiable
Computation (MVC), in which a set of computationally-weak clients outsource the …