搜索结果: 1-8 共查到“军队指挥学 Secure outsourcing”相关记录8条 . 查询时间(0.078 秒)
Efficient and Secure Outsourcing of Genomic Data Storage
secure outsourcing homomorphic encryption private information retrieval
font style='font-size:12px;'>
2017/3/9
loud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing of sensitive data, such as genomic data, c...
Secure Outsourcing of Circuit Manufacturing
hardware Trojans circuit compilers fabless manufacturing
font style='font-size:12px;'>
2016/5/30
The fabrication process of integrated circuits (ICs) is complex and requires the use of
off-shore foundries to lower the costs and to have access to leading-edge manufacturing
facilities. Such an ou...
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
secure outsourcing algorithm bilinear pairings one-malicious model
font style='font-size:12px;'>
2016/2/24
Outsourcing paradigm has become a hot research topic in the cryptography
community, where computation workloads can be outsourced to cloud servers by the
resource-constrained devices, such as RFID t...
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
secure outsourcing algorithm modular exponentiations one-malicious model
font style='font-size:12px;'>
2016/1/27
Outsourcing paradigm is one of the most attractive benefits of cloud computing,
where computation workloads can be outsourced to cloud servers by the resourceconstrained
devices, such as RFID tags. ...
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Secure outsourcing algorithms Modular exponentiation Mobile computing
font style='font-size:12px;'>
2016/1/7
Reducing computational cost of cryptographic computations for
resource-constrained devices is an active research area. One of the practical
solutions is to securely outsource the computations to an ...
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Secure outsourcing data privacy cloud computing
font style='font-size:12px;'>
2015/12/22
This paper addresses the secure outsourcing problem for large-scale matrix computation to
a public cloud. We propose a novel public-key weave ElGamal encryption (WEE) scheme for encrypting
a matrix ...
More Efficient Secure Outsourcing Methods for Bilinear Maps
Bilinear maps Secure delegation Secure Cloud Computing
font style='font-size:12px;'>
2015/12/22
Bilinear maps are popular cryptographic primitives which have been commonly used in various modern cryptographic protocols. However, the cost of computation for bilinear maps is expensive because of t...
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
Homomorphism Delegation Homomorphic Encryption Functional Encryption Verifiable Computation Public-Key Cryptography Provable Security
font style='font-size:12px;'>
2012/3/28
In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encr...