Comment on Two schemes for Secure Outsourcing of Linear Programming

نویسندگان

  • Zhengjun Cao
  • Lihua Liu
چکیده

Recently, Wang et al. [IEEE INFOCOM 2011, 820-828], and Nie et al. [IEEE AINA 2014, 591-596] have proposed two schemes for secure outsourcing of large-scale linear programming (LP). They did not consider the standard form: minimize cx, subject to Ax = b,x ≥ 0. Instead, they studied a peculiar form: minimize cx, subject to Ax = b,Bx ≥ 0, where B is a non-singular matrix. In this note, we stress that the proposed peculiar form is unsolvable and meaningless. The two schemes have confused the functional inequality constraints Bx ≥ 0 with the nonnegativity constraints x ≥ 0 in the linear programming model. But the condition x ≥ 0 is indispensable to the simplex method. Therefore, both two schemes failed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Note on Two Schemes for Secure Outsourcing of Linear Programming

Recently, Wang et al. [IEEE INFOCOM 2011, 820-828], and Nie et al. [IEEE AINA 2014, 591-596] have proposed two schemes for secure outsourcing of linear programming (LP). They did not consider the standard form: minimize cx, subject to Ax = b,x ≥ 0. Instead, they studied a peculiar form: minimize cx, subject to Ax = b,Bx ≥ 0, where B is a non-singular matrix. In this note, we stress that the pro...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

A weighted Additive Fuzzy Programming Approach for Logistics Outsourcing Selection in Car Industry

Logistics outsourcing has been at the top of the management agenda during recent decades. The selection of the proper service supplier is the key to success in logistic outsourcing Firms could select the right supplier by applying appropriate methods and selection criteria. In this paper a new framework is proposed on the basis of weighted additive fuzzy programming approach and linear programm...

متن کامل

Preserving privacy for secure and outsourcing for Linear Programming in cloud computing

Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism aut...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1511.06470  شماره 

صفحات  -

تاریخ انتشار 2015