A secure and verifiable outsourcing scheme for matrix inverse computation.
Chunqiang HuAbdulrahman AlhothailyArwa AlrawaisXiuzhen ChengCarl SturtivantHang LiuPublished in: INFOCOM (2017)
Keyphrases
- secret sharing
- secret sharing scheme
- secure communication
- authentication scheme
- matrix inversion
- information technology
- orthogonal matrices
- key distribution
- business process
- security analysis
- square root
- digital signature scheme
- protection scheme
- diffie hellman
- public key encryption
- electronic voting
- key exchange
- correlation matrix
- business processes
- information systems
- linear algebra
- sufficient conditions
- service providers
- dot product
- smart card
- data encryption
- jacobian matrix
- multi party
- authentication protocol