{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:36Z","timestamp":1750306836493,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["AFOSR-FA9550-09-1-0223"],"award-info":[{"award-number":["AFOSR-FA9550-09-1-0223"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0915843 and CNS-1223699"],"award-info":[{"award-number":["CNS-0915843 and CNS-1223699"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2013,11]]},"abstract":"<jats:p>Cloud computing services are becoming more prevalent and readily available today, bringing to us economies of scale and making large-scale computation feasible. Security and privacy considerations, however, stand in the way of fully utilizing the benefits of such services and architectures. In this work we address the problem of secure outsourcing of large-scale biometric experiments to a cloud or grid in a way that the client can verify that with very high probability the task was computed correctly. We conduct thorough theoretical analysis of the proposed techniques and provide implementation results that indicate that our solution imposes modest overhead.<\/jats:p>","DOI":"10.1145\/2535523","type":"journal-article","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T13:28:12Z","timestamp":1386682092000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Secure and verifiable outsourcing of large-scale biometric computations"],"prefix":"10.1145","volume":"16","author":[{"given":"Marina","family":"Blanton","sequence":"first","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN"}]},{"given":"Yihua","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN"}]},{"given":"Keith B.","family":"Frikken","sequence":"additional","affiliation":[{"name":"Miami University, Oxford, OH"}]}],"member":"320","published-online":{"date-parts":[[2013,12,6]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.66"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755695"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.12"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414479"},{"key":"e_1_2_2_8_1","first-page":"2","article-title":"Secure outsourced computation of iris matching","volume":"20","author":"Blanton M.","year":"2012","journal-title":"J. Comput. Secur."},{"volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS'11)","author":"Blanton M.","key":"e_1_2_2_9_1"},{"key":"e_1_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Blanton M. Zhang Y. and Frikken K. 2011a. Secure and verifiable outsourcing of large-scale biometric computations. Tech. rep. 2011-04 Department of Computer Science and Engineering University of Notre Dame.  Blanton M. Zhang Y. and Frikken K. 2011a. Secure and verifiable outsourcing of large-scale biometric computations. Tech. rep. 2011-04 Department of Computer Science and Engineering University of Notre Dame.","DOI":"10.1109\/PASSAT\/SocialCom.2011.13"},{"volume-title":"Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'11)","author":"Blanton M.","key":"e_1_2_2_11_1"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-009-0098-7"},{"volume-title":"Proceedings of the USENIX Security Symposium. 223--240","author":"Burkhart M.","key":"e_1_2_2_13_1"},{"volume-title":"Proceedings of the International Conference on Security and Cryptography in Networks (SCN'10)","author":"Catrina O.","key":"e_1_2_2_14_1"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_9"},{"volume-title":"Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)","author":"Du W.","key":"e_1_2_2_17_1"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_14"},{"volume-title":"Proceedings of the 30th Annual Conference on Advances in Cryptology (CRYPTO'10)","author":"Gennaro R.","key":"e_1_2_2_19_1"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277716"},{"key":"e_1_2_2_21_1","unstructured":"Gens F. 2008. It cloud services user survey pt. 2: top benefits and challenges. http:\/\/bit.ly\/oUCbY.  Gens F. 2008. It cloud services user survey pt. 2: top benefits and challenges. http:\/\/bit.ly\/oUCbY."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"volume-title":"Proceedings of the Conference on Topics in Cryptology: The Cryptographer's Track at RSA (CT-RSA'01)","author":"Golle P.","key":"e_1_2_2_23_1"},{"volume-title":"Proceedings of the International Conference on Financial Cryptography (FC'01)","author":"Golle P.","key":"e_1_2_2_24_1"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.08.008"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873601.1873702"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_2_2_28_1","unstructured":"Kahney L. 2001. Cheaters bow to peer pressure. WIRED Mag. http:\/\/bit.ly\/ZVuXCJ.  Kahney L. 2001. Cheaters bow to peer pressure. WIRED Mag. http:\/\/bit.ly\/ZVuXCJ."},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11145-7_15"},{"volume-title":"Proceedings of the 6th International Workshop on Agents and Peer-to-Peer Computing (AP2PC'07)","author":"Kim H.","key":"e_1_2_2_30_1"},{"volume-title":"Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS'08)","author":"Kuhn M.","key":"e_1_2_2_31_1"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989423"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP'03)","author":"Szajda D.","key":"e_1_2_2_34_1"},{"volume-title":"Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'11)","author":"Wang C.","key":"e_1_2_2_35_1"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2009.36"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2535523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:57Z","timestamp":1750234197000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["10.1145\/2535523"],"URL":"https:\/\/doi.org\/10.1145\/2535523","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2013,11]]},"assertion":[{"value":"2012-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}