Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Jiameng SunBinrui ZhuJing QinJiankun HuJixin MaPublished in: Secur. Commun. Networks (2018)
Keyphrases
- linear algebra
- matrix multiplication
- symmetric matrix
- sufficient conditions
- evaluation metrics
- dot product
- sparse matrix
- neural network
- evaluation model
- transformation matrix
- secret sharing
- positive definite
- square root
- evaluation criteria
- vector space
- collaborative filtering
- feature vectors
- pairwise
- information retrieval