[1] |
DIFFIE W, HELLMAN M E.New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
|
[2] |
RIVEST R L, SHAMIR A, ADLEMAN L.A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J]. Communications of the ACM, 1978, 26(2): 96-99.
|
[3] |
EL GAMAL T.A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
|
[4] |
REN K, WANG C, WANG Q.Security Challenges for the Public Cloud[J]. IEEE Internet Computing, 2012, 16(1): 69-73.
|
[5] |
WANG C, CAO N, REN K, et al.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data[J]. IEEE Transactions on Parallel & Distributed Systems, 2012, 23(8): 1467-1479.
|
[6] |
HOHENBERGER S,LYSYANSKAYA A. How to Securely Outsource Cryptographic Computations[EB/OL]. .
|
[7] |
CHEN X, LI J, MA J, et al. New Algorithms for Secure Outsourcing of Modular Exponentiations[EB/OL]. , 2018-7-1.
|
[8] |
YE J, XU Z, DING Y.Secure Outsourcing of Modular Exponentiations in Cloud and Cluster Computing[J]. Cluster Computing, 2016, 19(2): 811-820.
|
[9] |
DING Y, XU Z, YE J, et al. Secure Outsourcing of Modular Exponentiations under Single Untrusted Programme Model[EB/OL].
|
[10] |
SU Q, YU J, TIAN C, et al. How to Securely Outsource the Inversion Modulo a Large Composite Number[EB/OL].
|
[11] |
ZHOU K,REN J.Secure Outsourcing of Scalar Multiplication on Elliptic Curves[EB/OL]. .
|
[12] |
LEI X, LIAO X, HUANG T, et al.Achieving Security, Robust Cheating Resistance, and High-efficiency for Outsourcing Large Matrix Multiplication Computation to a Malicious Cloud[J]. Information Sciences, 2014, 280: 205-217.
|
[13] |
HU Xing, PEI Dingyi, TANG Chunming, et al.Verifiable and Secure Outsourcing of Matrix Calculation and its Application[J]. Scientia Sinica(Informationis), 2013, 43(7): 842-852.
|
|
胡杏,裴定一,唐春明,等.可验证安全外包矩阵计算及其应用[J].中国科学:信息科学, 2013,43(7):842-852.
|
[14] |
ZHANG Y, BLANTON M. Efficient Secure and Verifiable Outsourcing of Matrix Multiplications[EB/OL]., 2018-7-1.
|
[15] |
WU Duoduo, LAI Qiqi, YANG Bo.Efficient, Verifiable and Secure Outsourcing of Matrix Multiplication[J]. Journal of Cryptologic Research, 2017, 4(4): 322-332.
|
|
武朵朵,来齐齐,杨波.矩阵乘积的高效可验证安全外包计算[J].密码学报,2017,4(4):322-332.
|
[16] |
LEI X, LIAO X, HUANG T, et al.Outsourcing Large Matrix Inversion Computation to a Public Cloud[J]. IEEE Transactions on Cloud Computing, 2013, 1(1): 78-87.
|
[17] |
REN X, HUANG H.Secure and Efficient Protocol for Outsourcing Large Matrix Determinant Computation to Semi-honest Cloud[J]. Computer Engineering & Applications, 2014, 50(10): 82-86.
|
|
任晓霞,黄宏宇.安全高效的大矩阵行列式计算云外包协议[J].计算机工程与应用,2014,50(10):82-86.
|
[18] |
FU S, YU Y,XU M. Practical Privacy-preserving Outsourcing of Large-scale Matrix Determinant Computation in the Cloud[EB/OL]..
|
[19] |
WU Hongfeng, REN Huanshu.An Outsourcing Computing Based on Large Matrix QR Decomposition in Cloud Environment[J]. Netinfo Security, 2018, 18(3): 86-90.
|
|
吴宏锋,任桓枢.云环境下基于大规模矩阵QR分解的外包计算[J].信息网络安全,2018,18(3):86-90.
|
[20] |
WANG C, REN K, WANG J, et al.Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations[J]. IEEE Transactions on Parallel & Distributed Systems, 2013, 24(6):1172-1181.
|
[21] |
CHEN X, HUANG X, LI J, et al.New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations[J]. IEEE Transactions on Information Forensics & Security, 2014, 10(1):69-78.
|
[22] |
DENG Fuhu, LI Zhenyu, ZENG Liyao, et al.A Cloud Decryption System Based on El-Gamal Security Outsourcing Decryption[J]. Netinfo Security, 2017, 17(12): 73-79.
|
|
邓伏虎,李震宇,曾莉尧,等.一种支持El-Gamal安全外包解密的云密码系统[J].信息网络安全,2017,17(12):73-79.
|