MD- $$\mathcal {VC}_{Matrix}$$ VC M a t r i x : An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication

作者: Gang Sheng , Chunming Tang , Wei Gao , Ying Yin

DOI: 10.1007/978-3-319-46298-1_23

关键词:

摘要: Cloud service provider that is equipped with tremendous resources enables the terminals constrained to perform outsourced query or computation on large scale data. Security challenges are always research hotspots in community. In this paper, we investigate problem of publicly verifiable matrix multiplication. However, state-of-the-art scheme, a number computationally expensive operations adopted achieve goal public verification. Thus, scheme works inefficiently actually due fact most time spent verification-related computing. To lower cost, propose an efficient for verification The two-dimensional transformed into one-dimensional vector, which retains computing ability and used as substitute subsequent work. security analysis demonstrates proposed outsourcing performance shows running efficiency scheme.

参考文章(25)
Taeho Jung, Xiang-Yang Li, Shaojie Tang, Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely international conference on computer communications. ,(2012) , 10.1109/INFCOM.2013.6567071
Can Xiang, Chunming Tang, Yunlu Cai, Qiuxia Xu, Privacy-preserving face recognition with outsourced computation soft computing. ,vol. 20, pp. 3735- 3744 ,(2016) , 10.1007/S00500-015-1759-5
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25
Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen, Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution broadband and wireless computing, communication and applications. pp. 572- 577 ,(2014) , 10.1109/BWCCA.2014.117
Sergio Salinas, Changqing Luo, Xuhui Chen, Pan Li, Efficient secure outsourcing of large-scale linear systems of equations 2015 IEEE Conference on Computer Communications (INFOCOM). pp. 1035- 1043 ,(2015) , 10.1109/INFOCOM.2015.7218476
Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, Cloud Computing Service: The Caseof Large Matrix Determinant Computation IEEE Transactions on Services Computing. ,vol. 8, pp. 688- 700 ,(2015) , 10.1109/TSC.2014.2331694
An Liu, Kai Zhengy, Lu Liz, Guanfeng Liu, Lei Zhao, Xiaofang Zhou, Efficient secure similarity computation on encrypted trajectory data international conference on data engineering. pp. 66- 77 ,(2015) , 10.1109/ICDE.2015.7113273
Mikhail J. Atallah, Keith B. Frikken, Securely outsourcing linear algebra computations computer and communications security. pp. 48- 59 ,(2010) , 10.1145/1755688.1755695
Dario Fiore, Rosario Gennaro, Publicly verifiable delegation of large polynomials and matrix computations, with applications Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 501- 512 ,(2012) , 10.1145/2382196.2382250
Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, Chunqiang Hu, Outsourcing Large Matrix Inversion Computation to A Public Cloud ieee international conference on cloud computing technology and science. ,vol. 1, pp. 1- 1 ,(2013) , 10.1109/TCC.2013.7