研究目的
Design secure, correct, and efficient protocols for outsourcing the ED and SVD of a matrix to a malicious cloud.
研究成果
We have designed two protocols for outsourcing eigen-decomposition and singular value decomposition of large-scale matrix to a malicious cloud. We have shown that both of the two outsourcing protocols fulfill the goals of security, cheating resilience and high efficiency. We also introduce outsourcing principle component analysis as an application of our proposed outsourcing protocols.
研究不足
The encryption method may suffer from the problem of 'zero item leakage', which means that the cloud may know the number of zeros in the original matrix by counting the number of zeros in the encrypted matrix.
1:Key generation:
The customer randomly generates the key K which is used to encrypt the original matrix A.
2:Encryption:
The customer encrypts the original matrix A using the key K. We use matrix multiplication and linear mapping to transform the original matrix A into an encrypted one B.
3:Computing ED/SVD of matrix:
The cloud computes the eigenvalues and corresponding eigenvectors or singular values and singular vectors of matrix B.
4:Verification:
The customer verifies whether the result returned from the cloud is correct or not. If the result passes through the verification, the customer accepts the result, otherwise the customer claims the treating behavior of the cloud and requires the cloud to compute again.
5:Decryption:
If the returned result is correct, the customer decrypts the eigenvalues and eigenvectors of B to get the ultimate eigenvalues and eigenvectors of A, or decrypts the singular values and singular vectors of B to the singular values and singular vectors of A.
独家科研数据包,助您复现前沿成果,加速创新突破
获取完整内容