This document discusses a secure optimization computation outsourcing method in cloud computing, specifically focusing on linear programming (LP) tasks. It details a mechanism that separates LP computation into public solvers and private parameters, allowing for a balance between security and efficiency while protecting sensitive data. The study presents techniques for privacy-preserving transformations of LP problems and a verification method based on duality theorems, showing effective and low-cost solutions.
Related topics: