You are not logged in.

Enabling efficient publicly verifiable outsourcing computation for matrix multiplication

Li, Hongwei,, Zhang, Shenmin, Luan, Tom H., Ren, Hao, Dai, Yuanshun and Zhou, Liang 2015, Enabling efficient publicly verifiable outsourcing computation for matrix multiplication, in ITNAC 2015: Proceedings of the International Telecommunication Networks and Applications 2015 Conference, IEEE, Piscataway, N.J., pp. 44-50, doi: 10.1109/ATNAC.2015.7366787.

Attached Files
Name Description MIMEType Size Downloads

Title Enabling efficient publicly verifiable outsourcing computation for matrix multiplication
Author(s) Li, Hongwei,
Zhang, Shenmin
Luan, Tom H.
Ren, Hao
Dai, Yuanshun
Zhou, Liang
Conference name International Telecommunication Networks and Applications. Conference (25th : 2015 : Sydney, N.S.W.)
Conference location Sydney, N.S.W.
Conference dates 18-20 Nov. 2015
Title of proceedings ITNAC 2015: Proceedings of the International Telecommunication Networks and Applications 2015 Conference
Editor(s) [Unknown]
Publication date 2015
Conference series International Telecommunication Networks and Applications Conference
Start page 44
End page 50
Total pages 7
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) outsourcing computation
matrix multiplication
publicly verifiable
cloud computing
Summary Outsourcing heavy computational tasks to remote cloud server, which accordingly significantly reduce the computational burden at the end hosts, represents an effective and practical approach towards extensive and scalable mobile applications and has drawn increasing attention in recent years. However, due to the limited processing power of the end hosts yet the keen privacy concerns on the outsourced data, it is vital to ensure both the efficiency and security of the outsourcing computation in the cloud computing. In this paper, we address the issue by developing a publicly verifiable outsourcing computation proposal. In particular, considering a large amount of applications of matrix multiplication in large datasets and image processing, we propose a publicly verifiable outsourcing computation scheme for matrix multiplication in the amortized model. Security analysis demonstrates that the proposed scheme is provable secure by blinding input and output in a simple way. By comparing the developed scheme with existing proposals, we show that our proposal is more efficient in terms of functionality, as well as the computation, communication and storage overhead.
ISBN 9781467393485
Language eng
DOI 10.1109/ATNAC.2015.7366787
Field of Research 080503 Networking and Communications
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30084333

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 2 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 85 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Fri, 24 Jun 2016, 11:30:41 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.