Secure and verifiable outsourcing protocol for non-negative matrix factorisation.
Zhenhua LiuBin LiQi HanPublished in: Int. J. High Perform. Comput. Netw. (2018)
Keyphrases
- cryptographic protocols
- covert channel
- secret sharing
- authentication protocol
- security protocols
- scalar product
- key distribution
- secure routing
- lightweight
- group communication
- security analysis
- multi party
- electronic voting
- homomorphic encryption
- key management
- key agreement protocol
- key exchange protocol
- provably secure
- privacy preserving
- secure multi party
- mutual authentication
- key exchange
- secure communication
- password authentication
- information systems
- sufficient conditions
- diffie hellman
- secure multiparty computation
- vertically partitioned data
- cryptographic algorithms
- information technology
- rfid systems
- security properties
- standard model
- security requirements
- security model
- user privacy
- blind signature
- trusted third party
- mobile agent system
- key establishment
- data sharing
- ad hoc networks
- tcp ip
- public key cryptosystems
- authentication scheme
- formal analysis
- digital signature