Homomorphic encryption matrix determinant security outsourcing method based on cloud computing

A technology of homomorphic encryption and secure outsourcing, applied in the field of matrix operations, can solve problems such as low efficiency in solving determinants, and achieve the effects of reducing space complexity, improving efficiency, and protecting security

Active Publication Date: 2019-10-11
ZHEJIANG SCI-TECH UNIV
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the efficiency of solving the determinant of homomorphic encryption technology is relatively low, homomorphic encryption technology has a strict

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic encryption matrix determinant security outsourcing method based on cloud computing
  • Homomorphic encryption matrix determinant security outsourcing method based on cloud computing
  • Homomorphic encryption matrix determinant security outsourcing method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] figure 2 , 3 A schematic diagram of the process of calculating μ(A) and matrix multiplication on the cloud server side (taking the third order as an example), the specific process is as follows:

[0050](Step 1) With the increasing popularity of cloud computing, people outsource a large number of computing tasks to cloud service providers. The client collects industrial data, such as medical data, traffic flow data, customer sales data, financial data and other data that need to be kept confidential; forms the collected data into a matrix A, encodes and encrypts it, and obtains the corresponding ciphertext matrix ct (A), and then upload the ciphertext matrix ct(A) to the cloud server.

[0051]

[0052] The matrix A is a square matrix of order n, n is a positive integer, and ct represents the ciphertext.

[0053] Encoding and encrypting the entire matrix into a ciphertext not only saves storage space, but also only requires a limited number of ciphertext operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a homomorphic encryption matrix determinant security outsourcing method based on cloud computing, which is characterized in that the whole matrix is encoded and encrypted intoa ciphertext by applying matrix encoding technology, and efficient matrix determinant security outsourcing computation is realized in combination with a division-free determinant computation method. The method comprises a data encryption/decryption method and a homomorphic calculation method. A client side executes the encryption method, codes, encrypts and uploads the matrix to a cloud server. Acloud server side executes a homomorphic calculation method, carries out ciphertext operation under the condition of not decrypting, and returns a calculation result to the client side in a ciphertextform. Finally, the client side executes the decryption module to obtain the determinant value of the matrix. Most calculation is carried out at the cloud server side, so that calculation workload ofthe client side is greatly reduced.

Description

technical field [0001] The invention relates to matrix operation under homomorphic encryption technology, especially matrix determinant calculation. Background technique [0002] Matrix operation is an important basic operation in mathematics. Many practical problems can be described by matrix, which has a wide range of applications in mathematics, physics, and engineering. The determinant calculation in matrix operation is one of the most basic operations in matrix calculation, and it is widely used in solving linear equations, finding the inverse matrix, and finding the eigenvalues ​​of the matrix, etc. [0003] In recent years, cloud computing has received widespread attention, and it has powerful computing capabilities that can help clients perform complex calculations. At present, cloud computing mainly adopts authentication and access control strategies to ensure data confidentiality and security in data transmission. However, these security measures are used to prev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/08G06F17/16
CPCH04L9/008H04L67/10G06F17/16Y02P90/30
Inventor 黄海王淑芳
Owner ZHEJIANG SCI-TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products