loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mikhail J. Atallah 1 ; Keith B Frikken 2 and Shumiao Wang 1

Affiliations: 1 Purdue University, United States ; 2 Miami University, United States

Keyword(s): Privacy-preserving Protocols, Private Outsourcing.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Security and Privacy in IT Outsourcing

Abstract: Many protocols exist for a client to outsource the multiplication of matrices to a remote server without revealing to the server the input matrices or the resulting product, and such that the server does all of the super-linear work whereas the client does only work proportional to the size of the input matrices. These existing techniques hinge on the existence of additive and multiplicative inverses for the familiar matrix multiplication over the (+,∗) ring, and they fail when one (or both) of these inverses do not exist, as happens for many practically important algebraic structures (including closed semi-rings) when one or both of the two operations in the matrix multiplication is the “min” or “max” operation. Such matrix multiplications are very common in optimization. We give protocols for the cases of (+,min) multiplication, (min,max) multiplication, and of (min,+) multiplication; the last two cases are particularly important primitives in many combinatorial optimization proble ms. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.15.211.41

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
J. Atallah, M.; B Frikken, K. and Wang, S. (2012). Private Outsourcing of Matrix Multiplication over Closed Semi-rings. In Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT; ISBN 978-989-8565-24-2; ISSN 2184-3236, SciTePress, pages 136-144. DOI: 10.5220/0004054101360144

@conference{secrypt12,
author={Mikhail {J. Atallah}. and Keith {B Frikken}. and Shumiao Wang.},
title={Private Outsourcing of Matrix Multiplication over Closed Semi-rings},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT},
year={2012},
pages={136-144},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004054101360144},
isbn={978-989-8565-24-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT
TI - Private Outsourcing of Matrix Multiplication over Closed Semi-rings
SN - 978-989-8565-24-2
IS - 2184-3236
AU - J. Atallah, M.
AU - B Frikken, K.
AU - Wang, S.
PY - 2012
SP - 136
EP - 144
DO - 10.5220/0004054101360144
PB - SciTePress