Cloud computing matrix determinant secure outsourcing computation encryption method

An encryption method and security outsourcing technology, which is applied in the field of security outsourcing computing and encryption, to reduce time complexity and improve efficiency

Pending Publication Date: 2018-11-06
XINXIANG POWER SUPPLY COMPANY STATE GRID HENAN ELECTRIC POWER +1
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this solution reduces the calculation cost of the cloud server to a certain extent, if the cloud server multiplies the two returned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing matrix determinant secure outsourcing computation encryption method
  • Cloud computing matrix determinant secure outsourcing computation encryption method
  • Cloud computing matrix determinant secure outsourcing computation encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

[0025] Such as figure 1 As shown, a secure outsourcing calculation and encryption method of a matrix determinant in cloud computing according to the present invention includes a key module, an encryption module, a calculation module, a verification module and a decryption module, wherein the key module, the encryption module, and the verification module The decryption module and the decryption module are set on the user's local client, and the calculation module is set on the cloud server, which includes the following steps in turn:

[0026] A: The local client reads the data entered by the user and forms a matrix A:

[0027] Matrix A is a square matrix of order n; where n is a positive integer;

[0028] B: The local client preprocesses matrix A to generate encrypted matrix A 1 "":

[0029] Step B includes the following specific steps:

[0030] B1: A set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud computing matrix determinant secure outsourcing computation encryption method. A brand-new matrix determinant outsourcing computation encryption method is put forward by using matrix determinant identical transformation and the relevant properties of the partition matrix so that the security of each data element in the matrix and the verifiability of the operation result can be guaranteed. The system according to the method is composed of a key module, an encryption module, a computing module, a verification module and a decryption module. The key module, the encryption module, the verification module and the decryption module are arranged on the user local client side. The computing module is arranged on the cloud side server. Complex computation is performed on the cloud side server so that the time complexity of the algorithm can be reduced and the efficiency of the algorithm can be greatly enhanced.

Description

technical field [0001] The invention relates to the field of cloud computing security, in particular to a secure outsourcing calculation encryption method of a matrix determinant in cloud computing. Background technique [0002] As a basic calculation problem, matrix calculation has a wide range of applications in large-scale engineering calculations, astrophysics research, economic trend analysis, meteorological environment prediction, graphics and image processing and other fields. To some extent, matrix operations, especially large-scale matrix operations, directly affect the development of national industrial infrastructure and national defense. However, for large matrices, its operation is a very time-consuming task, often requiring an extremely expensive price. [0003] The emergence of cloud computing has brought good news to all of these. As a commercial service model, cloud computing essentially outsources its own sufficient equipment resources. Customers use entru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L29/06
CPCH04L9/0631H04L9/0816H04L9/0861H04L9/0869H04L63/12H04L67/01
Inventor 刘祥闫晟瑄庞小澎苏浩张燕
Owner XINXIANG POWER SUPPLY COMPANY STATE GRID HENAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products