Nothing Special   »   [go: up one dir, main page]

Li et al., 2020 - Google Patents

Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance

Li et al., 2020

Document ID
6311852897465481819
Author
Li H
Yu J
Zhang H
Yang M
Wang H
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

With the development of Internet of Things (IoT) and 5G, edge computing, as a new computing paradigm, has been widely popularized in academia and industry. Due to the distributed architecture and being close to the user, edge computing can faster respond to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/141Discrete Fourier transforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Li et al. Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance
Panda et al. A secure mutual authentication protocol for IoT environment
Kavitha et al. An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system
Ding et al. Secure outsourcing of modular exponentiations under single untrusted programme model
Kalaria et al. A Secure Mutual authentication approach to fog computing environment
Mullai et al. Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices
CN111984990A (en) Matrix multiplication task outsourcing method supporting privacy protection based on edge calculation
Fu et al. Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server
Ren et al. Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Lu et al. Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service
Berguig et al. Anonymous and lightweight secure authentication protocol for mobile Agent system
Li et al. Dsos: a distributed secure outsourcing system for edge computing service in iot
Chatterjee et al. An improved authentication and key agreement protocol for smart healthcare system in the context of internet of things using elliptic curve cryptography
Fanfara et al. Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication
Li et al. Secure outsourcing of large-scale convex optimization problem in internet of things
Gao et al. Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing
Xiao et al. New digital signature algorithm based on ECC and its application in bitcoin and IoT
Sundararajan et al. A comprehensive survey on lightweight asymmetric key cryptographic algorithm for resource constrained devices
Hsiao et al. Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things.
Erfan et al. Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
Mujeerulla et al. Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction
Zhao et al. Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server
Zhang et al. Secure outsourcing algorithms of modular exponentiations in edge computing
Khan et al. Security and Performance Analysis of Elliptic Curve Crypto System using Bitcoin Curves.
Jebrane et al. ILAPU-Q: An Improved Lightweight Authentication Protocol for IoT Based on U-quark Hash Function