Parameter Selection for Server-Aided RSA Computation Schemes
IEEE Transactions on Computers
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Security and Performance of Server-Aided RSA Computation Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fast Server-Aided RSA Signatures Secure Against Active Attacks
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Generating RSA Keys on a Handheld Using an Untrusted Server
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Secure outsourcing of sequence comparisons
International Journal of Information Security - Special issue on SC 2003
Grid's confidential outsourcing of string matching
SEPADS'07 Proceedings of the 6th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Private and Cheating-Free Outsourcing of Algebraic Computations
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
Computing arbitrary functions of encrypted data
Communications of the ACM
Attacks on protocols for server-aided RSA computation
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Securely outsourcing linear algebra computations
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure Ranked Keyword Search over Encrypted Cloud Data
ICDCS '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
Non-interactive verifiable computing: outsourcing computation to untrusted workers
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Security analysis of a server-aided RSA key generation protocol
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
How to securely outsource cryptographic computations
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Fast server-aided secret computation protocols for modular exponentiation
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this paper, we present several methods of secure outsourcing of numerical and scientific computations. Current outsourcing techniques are inspired by the numerous problems in computational mathematics, where a solution is obtained in the form of an approximation. Examples of such problems can be found in the fields of economics, military, petroleum industry, and in other areas. Many of today's scientific and numerical problems require large computational resources; therefore, they can only be solved on supercomputers or by using the capabilities of the largest computing systems, such as grid technology, cloud, etc. We believe that it is imperative to improve the mathematical framework to enable secure outsourcing. Therefore, the main goal of this paper is to present different methods of finding approximate solutions to some equations solved by an external computer. To accomplish this, we chose certain classes of algebraic and differential equations because, in most cases, modern computing problems are reduced to solving such systems of equations (differential equations, linear programming, etc.). As an important application example we are presenting a specific applied problem related to geological exploration.