Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system
A technology of matrix multiplication, calculation method, applied in the field of cloud computing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0082] Example one
[0083] Such as figure 1 As shown, the verifiable outsourcing calculation method for achieving safe and efficient large-scale matrix multiplication provided by this embodiment may, but is not limited to, include the following steps S101 to S105.
[0084] S101. Use a one-way trapdoor function to generate a public-private key pair Where A represents the public key matrix and Is the private key matrix and q represents a prime number greater than 2, Means right Find the remainder of each element in q, Z q ∈{0,1,2,...,q-1}, m is a positive integer not less than 1000, n is a positive integer and n<
[0085] In the step S101, the one-way trapdoor function is a special one-way function with a trapdoor, which contains two obvious characteristics: one is one-way, and the other is the existence of a trap; the so-called one-way , Also known as irreversibility, that is, for a function y=f(x), it is easy to calculate y if x is known, but x=f if y is known -1 (x) is no...
Example Embodiment
[0158] Example two
[0159] Such as figure 2 As shown, this embodiment provides a client that implements the aforementioned first embodiment, which is used to implement the verifiable outsourcing calculation method that implements large-scale matrix multiplication safely and efficiently as described in the first embodiment, and includes a key generation module, Plaintext encryption module, transceiver module, ciphertext decryption module and result verification module;
[0160] The key generation module is used to generate a public-private key pair using a one-way trapdoor function Where A represents the public key matrix and Is the private key matrix and q represents a prime number greater than 2, Means right Find the remainder of each element in q, Z q ∈{0,1,2,...,q-1}, m is a positive integer not less than 1000, n is a positive integer and n<
[0161] The plaintext encryption module is communicatively connected to the key generation module for importing the first plainte...
Example Embodiment
[0172] Example three
[0173] Such as image 3 As shown, this embodiment provides a cloud computing system including the foregoing second embodiment, including a cloud computing server and a client as described in the second embodiment; the cloud computing server is communicatively connected to the transceiver module of the client, using Yu received the first ciphertext matrix set And the second ciphertext matrix set Afterwards, through outsourcing computing, cloud computing obtains the corresponding feedback matrix Φ, and the cloud computing result is fed back to the transceiver module. The working process and technical effects of this embodiment can also be derived without doubt with reference to the first embodiment, and will not be repeated here.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap