Public Cryptography Linear Programming Solver in Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
Cong Wang, Kui Ren, and Jia Wang , “Secure and Practical outsourcing of linear programming in Cloud computing” IEEE Transaction on cloud computing
P. Mell and T. Grance, “Draft nist working definition of cloud computing,” Referenced on Jan. 23rd, 2010 Online at http://csrc.nist.gov/ groups/SNS/cloud-computing/index.html, 2010.
Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing,” 2009, online at http://www.cloudsecurityalliance.org.
R. Gennaro, C. Gentry, and B. Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers,” in Proc. Of CRYPTO’10, Aug. 2010.
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. of ICDCS’10, 2010.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained access control in cloud computing,” in Proc. of IEEE INFOCOM’10, San Diego, CA, USA, March 2010.
D. Luenberger and Y. Ye, Linear and Nonlinear Programming, 3rd ed. Springer, 2008.
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. of ICDCS’10, 2010.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained access control in cloud computing,” in Proc. of IEEE INFOCOM’10, San Diego, CA, USA, March 2010.
S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004.
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. MIT press, 2008.
V. Strassen, “Gaussian elimination is not optimal,” Numer. Math., vol. 13, pp. 354–356, 1969.
D. Coppersmith and S. Winograd, “Matrix multiplication via arithmetic progressions,” in Proc. of STOC’87, 1987, pp. 1–6.
MOSEK ApS, “The MOSEK Optimization Software,” Online at http: //www.mosek.com/, 2010.
P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. Of EUROCRYPT’99, 1999, pp. 223– 238.
S. Even, O. Goldreich, and A. Lempel, “A randomized protocol for signing contracts,” Commun. ACM, vol. 28, no. 6, pp. 637–647, 1985
Refbacks
- There are currently no refbacks.