Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system

A technology of matrix multiplication, calculation method, applied in the field of cloud computing

Active Publication Date: 2020-02-21
SICHUAN UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Data privacy: user data may be sensitive and valuable, but in the process of outsourcing computing, the input of these data and the output of results will be obtained by the other party out of curiosity or premeditated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system
  • Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system
  • Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] Such as figure 1 As shown, the safe and efficient verifiable outsourced computing method for realizing large-scale matrix multiplication provided in this embodiment may, but is not limited to, include the following steps S101-S105.

[0084] S101. Using a one-way trapdoor function to generate a public-private key pair where A represents the public key matrix and is the private key matrix and q represents a prime number greater than 2, express yes Each element in finds the remainder about q, Z q ∈{0,1,2,...,q-1}, m is a positive integer not less than 1000, n is a positive integer and n<

[0085] In the step S101, the one-way trapdoor function is a kind of special one-way function with a trapdoor, which includes two obvious features: one is one-way, and the other is that there is a trapdoor; the so-called one-way , also known as irreversibility, that is, for a function y=f(x), it is easy to calculate y if x is known, but it is easy to calculat...

Embodiment 2

[0159] Such as figure 2 As shown, this embodiment provides a client that implements the first embodiment above, and is used to implement a safe and efficient verifiable outsourcing calculation method for large-scale matrix multiplication as described in the first embodiment, and includes a key generation module, Plaintext encryption module, transceiver module, ciphertext decryption module and result verification module;

[0160] The key generation module is used to generate a public-private key pair using a one-way trapdoor function where A represents the public key matrix and is the private key matrix and q represents a prime number greater than 2, express yes Each element in finds the remainder about q, Z q ∈{0,1,2,…,q-1}, m is a positive integer not less than 1000, n is a positive integer and n<<m;

[0161] The plaintext encryption module is connected to the key generation module in communication, and is used for importing the first plaintext mat...

Embodiment 3

[0173] Such as image 3 As shown, this embodiment provides a cloud computing system including the foregoing embodiment two, including a cloud computing server and a client as described in embodiment two; the cloud computing server communicates with the transceiver module of the client, and uses After receiving the first ciphertext matrix set and the second set of ciphertext matrices Finally, through outsourcing computing, the cloud computing obtains the corresponding feedback matrix Φ, and feeds back the cloud computing result to the transceiver module. The working process and technical effects of this embodiment can also be deduced undoubtedly with reference to Embodiment 1, and will not be repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computing, and discloses a verifiable outsourcing computing method for realizing the safety and high efficiency of large-scale matrix multiplication, a client and a cloud computing system. According to the present invention, a new outsourcing calculation protocol suitable for calculating a large-scale matrix multiplication result is provided, the client with less computing resources / weak computing power can outsource the multiplication operation of the matrix to the cloud server with a large number of computing resources with less computingexpenditure under the premise of ensuring that the sensitive matrix data is not leaked when facing the large-scale matrix multiplication operation, and the safe and reliable verification about a matrix multiplication result is provided for the client, so that the requirements of the outsourcing computation for safety (verifiability), privacy and high efficiency are met, and the method is convenient to apply and popularize practically. Compared with an existing related protocol, the probability that the verification scheme passes through a guessing result is lower, and the verification schemedoes not depend on an original plaintext matrix and the random verification times, and the verification efficiency is also higher.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, and in particular relates to a verifiable outsourcing computing method, client and cloud computing system for realizing safe and efficient large-scale matrix multiplication. Background technique [0002] With the rapid development and maturity of cloud service-related technologies, cloud computing is playing more and more roles in various fields. Cloud computing coordinates a large number of computer resources, so that it can provide customers with powerful computing capabilities and greatly improve the utilization of computing resources. Outsourced computing is a very important application in cloud computing. It can relieve customers with limited computing resources from heavy computing tasks and help them complete the computing tasks. However, this technology also brings some specific issues to be solved, such as the privacy of customers' sensitive data and the correctness of returned ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 赵亮陈泽
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products