Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system

A technology of matrix multiplication, calculation method, applied in the field of cloud computing

Active Publication Date: 2020-02-21
SICHUAN UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Data privacy: user data may be sensitive and valuable, but in the process of outsourcing computing, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system
  • Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system
  • Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0082] Example one

[0083] Such as figure 1 As shown, the verifiable outsourcing calculation method for achieving safe and efficient large-scale matrix multiplication provided by this embodiment may, but is not limited to, include the following steps S101 to S105.

[0084] S101. Use a one-way trapdoor function to generate a public-private key pair Where A represents the public key matrix and Is the private key matrix and q represents a prime number greater than 2, Means right Find the remainder of each element in q, Z q ∈{0,1,2,...,q-1}, m is a positive integer not less than 1000, n is a positive integer and n<

[0085] In the step S101, the one-way trapdoor function is a special one-way function with a trapdoor, which contains two obvious characteristics: one is one-way, and the other is the existence of a trap; the so-called one-way , Also known as irreversibility, that is, for a function y=f(x), it is easy to calculate y if x is known, but x=f if y is known -1 (x) is no...

Example Embodiment

[0158] Example two

[0159] Such as figure 2 As shown, this embodiment provides a client that implements the aforementioned first embodiment, which is used to implement the verifiable outsourcing calculation method that implements large-scale matrix multiplication safely and efficiently as described in the first embodiment, and includes a key generation module, Plaintext encryption module, transceiver module, ciphertext decryption module and result verification module;

[0160] The key generation module is used to generate a public-private key pair using a one-way trapdoor function Where A represents the public key matrix and Is the private key matrix and q represents a prime number greater than 2, Means right Find the remainder of each element in q, Z q ∈{0,1,2,...,q-1}, m is a positive integer not less than 1000, n is a positive integer and n<

[0161] The plaintext encryption module is communicatively connected to the key generation module for importing the first plainte...

Example Embodiment

[0172] Example three

[0173] Such as image 3 As shown, this embodiment provides a cloud computing system including the foregoing second embodiment, including a cloud computing server and a client as described in the second embodiment; the cloud computing server is communicatively connected to the transceiver module of the client, using Yu received the first ciphertext matrix set And the second ciphertext matrix set Afterwards, through outsourcing computing, cloud computing obtains the corresponding feedback matrix Φ, and the cloud computing result is fed back to the transceiver module. The working process and technical effects of this embodiment can also be derived without doubt with reference to the first embodiment, and will not be repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cloud computing, and discloses a verifiable outsourcing computing method for realizing the safety and high efficiency of large-scale matrix multiplication, a client and a cloud computing system. According to the present invention, a new outsourcing calculation protocol suitable for calculating a large-scale matrix multiplication result is provided, the client with less computing resources/weak computing power can outsource the multiplication operation of the matrix to the cloud server with a large number of computing resources with less computingexpenditure under the premise of ensuring that the sensitive matrix data is not leaked when facing the large-scale matrix multiplication operation, and the safe and reliable verification about a matrix multiplication result is provided for the client, so that the requirements of the outsourcing computation for safety (verifiability), privacy and high efficiency are met, and the method is convenient to apply and popularize practically. Compared with an existing related protocol, the probability that the verification scheme passes through a guessing result is lower, and the verification schemedoes not depend on an original plaintext matrix and the random verification times, and the verification efficiency is also higher.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a verifiable outsourcing computing method, client and cloud computing system for realizing safe and efficient large-scale matrix multiplication. Background technique [0002] With the rapid development and maturity of cloud service-related technologies, cloud computing is playing more and more roles in various fields. Cloud computing coordinates a large number of computer resources, so that it can provide customers with powerful computing capabilities and greatly improve the utilization of computing resources. Outsourced computing is a very important application in cloud computing. It can relieve customers with limited computing resources from heavy computing tasks and help them complete the computing tasks. However, this technology also brings some specific issues to be solved, such as the privacy of customers' sensitive data and the correctness of returned ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 赵亮陈泽
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products