New publicly verifiable computation for batch matrix multiplication

被引:27
|
作者
Zhang, Xiaoyu [1 ]
Jiang, Tao [1 ]
Li, Kuan-Ching [2 ]
Castiglione, Aniello [3 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Providence Univ, Sch Comp Sci & Informat Engn, Taichung, Taiwan
[3] Univ Salerno, Dept Comp Sci, Salerno, Italy
基金
中国国家自然科学基金;
关键词
Publicly verifiable computation; Public delegation; Batch matrix multiplication; Privacy protection; LARGE-SCALE SYSTEMS; CLOUD; SECURE; EFFICIENT; SERVICE; ALGORITHMS; DELEGATION; DATABASE;
D O I
10.1016/j.ins.2017.11.063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prevalence of cloud computing, the resource constrained clients are trended to outsource their computation-intensive tasks to the cloud server. Although outsourcing computation paradigm brings many benefits for both clients and cloud server, it causes some security challenges. In this paper, we focus on the outsourcing computation of matrix multiplication, and propose a new publicly verifiable computation scheme for batch matrix multiplication. Different from traditional matrix computation outsourcing model, the outsourcing task of our scheme is to compute MXi for group of clients, where X-i is a private matrix chosen by different clients and M is a public matrix given by a data center beforehand. Based on the two techniques of privacy-preserving matrix transformation and matrix digest, our scheme can protect the secrecy of the client's private matrix X-i and dramatically reduce the computation cost in both the key generation and the computing phases. Security analysis shows that the proposed scheme can achieve the desired security properties under the co-computational Diffie-Hellman assumption. We also provide the experimental evaluation that demonstrates the efficiency of our scheme. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:664 / 678
页数:15
相关论文
共 50 条
  • [1] New Publicly Verifiable Computation for Batch Matrix Multiplication
    Zhang, Xiaoyu
    Jiang, Tao
    Li, Kuan-Ching
    Chen, Xiaofeng
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 53 - 65
  • [2] Enabling Efficient Publicly Verifiable Outsourcing Computation for Matrix Multiplication
    Li, Hongwei
    Zhang, Shenmin
    Luan, Tom H.
    Ren, Hao
    Dai, Yuanshun
    Zhou, Liang
    [J]. 25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 44 - 50
  • [3] EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation
    Xu, Chang
    Rao, Hongzhou
    Zhu, Liehuang
    Zhang, Chuan
    Sharif, Kashif
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 7007 - 7022
  • [4] MD-vcMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 349 - 362
  • [5] Privacy-Preserving and Publicly Verifiable Matrix Multiplication
    Liu, Jing
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2059 - 2071
  • [6] Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
    Sun, Jiameng
    Zhu, Binrui
    Qin, Jing
    Hu, Jiankun
    Ma, Jixin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
    Fatemeh Erfan
    Hamid Mala
    [J]. Cluster Computing, 2020, 23 : 2835 - 2845
  • [8] Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
    Erfan, Fatemeh
    Mala, Hamid
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2835 - 2845
  • [9] Efficient and Publicly Verifiable Outsourcing of Large-scale Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    Cai, Yunlu
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (04): : 1253 - 1261
  • [10] Hybrid Publicly Verifiable Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 147 - 163