The rapid development of cloud computing has probably benefited each of us.
However, the privacy risks brought by untrustworthy cloud servers arise the
attention of more and more people and legislatures. In the last two decades,
plenty of works seek to outsource various specific tasks while ensuring the
security of private data. The tasks to be outsourced are countless; however,
the computations involved are similar. In this paper, we construct a series of
novel protocols that support the secure computation of various functions on
numbers (e.g., the basic elementary functions) and matrices (e.g., the
calculation of eigenvectors and eigenvalues) in arbitrary $ngeq 2$ servers.
All protocols only require constant rounds of interactions and achieve the low
computation complexity. Moreover, the proposed $n$-party protocols ensure the
security of private data even though $n-1$ servers collude. The convolutional
neural network models are utilized as the case studies to verify the protocols.
The theoretical analysis and experimental results demonstrate the correctness,
efficiency, and security of the proposed protocols.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

By admin