Comment on Two schemes for Secure Outsourcing of Linear Programming.
Zhengjun CaoLihua LiuPublished in: CoRR (2015)
Keyphrases
- linear programming
- linear program
- information technology
- key management scheme
- public key encryption
- quadratic programming
- optimal solution
- information systems
- constraint propagation
- np hard
- service providers
- integer programming
- key agreement
- provably secure
- key management
- primal dual
- business process
- sensitive data
- standard model
- dynamic programming
- news articles
- security mechanisms
- constraint satisfaction problems
- security model
- transaction costs
- lightweight
- computational complexity
- algorithm for linear programming
- objective function