Verifiable matrix multiplication security outsourcing calculation method and system

A security outsourcing, matrix multiplication technology, applied in the field of cloud computing, can solve the problem of not knowing the real data of the matrix, and achieve the effect of avoiding collusion attacks, improving robustness, and reducing computing pressure.

Inactive Publication Date: 2017-05-31
QINGDAO UNIV
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud only knows the processed matrix, but cannot know the real data of the matrix

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable matrix multiplication security outsourcing calculation method and system
  • Verifiable matrix multiplication security outsourcing calculation method and system
  • Verifiable matrix multiplication security outsourcing calculation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The participating members of the verifiable safe outsourcing calculation method of matrix multiplication provided by the present invention include user C and cloud server S, where user C is used to represent a user with limited computing ability. The cloud server S has sufficient computing power and can be provided to users in a pay-as-you-go manner. In the process of use, the user outsources the time-consuming calculation matrix multiplication operation to the cloud server. After the cloud server receives the matrix and operation, it uses its own powerful computing resources to perform the matrix multiplication operation. After the calculation is completed, the calculation result is returned to the user. . The user receives the calculation result returned by the cloud and verifies the correctness of the result.

[0031] The relevant theories used in the secure outsourcing computing method provided by the present invention are as follows:

[0032] matrix multiplicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verifiable matrix multiplication security outsourcing calculation method. The calculation method comprises the following steps: firstly, outsourcing of a user: namely rendering outsourcing of an own consumed time matrix multiplication calculation operation to a cloud server by the user; secondly, calculation of the cloud server: namely, carrying out matrix multiplication calculation by utilizing an own powerful computing resource by the cloud server after receiving a matrix and an operation, and returning a calculation result to the user after the calculation is completed; and thirdly, user restoring and verification: namely receiving the calculation result returned by virtue of cloud by the user, and verifying correctness of the result. In the method provided by the invention, calculation data uploaded to the cloud by the user are subjected to preprocessing calculation, so that privacy of user data is protected; when the cloud returns the result to the user, the user can efficiently verify the correctness of the result, and an error result is prevented from being returned to the user by virtue of the cloud and undetected.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a safe outsourcing computing method suitable for matrix multiplication. Background technique [0002] Matrix computing plays an important role in both scientific computing and cryptography. Many cryptographic protocol, scientific, and numerical computing problems involve matrix computations. However, for those users with limited computing power, it is not an easy task to complete the matrix calculation independently. Leveraging the powerful computing resources provided by outsourced computing, we are able to free users' computing power from being limited by their resource-constrained devices. During the matrix calculation process, users can outsource the matrix calculation process to the cloud. This enables users with limited computing power to perform matrix calculations. [0003] With the continuous development and growth of cloud computing, through clou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/53H04L29/08
CPCG06F7/53H04L67/10
Inventor 于佳郝蓉苏倩倩
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products