Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination

With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. At p...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024035
Tags: Add Tag
No Tags, Be the first to tag this record!