CN106788980A - Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing - Google Patents
Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing Download PDFInfo
- Publication number
- CN106788980A CN106788980A CN201710032412.7A CN201710032412A CN106788980A CN 106788980 A CN106788980 A CN 106788980A CN 201710032412 A CN201710032412 A CN 201710032412A CN 106788980 A CN106788980 A CN 106788980A
- Authority
- CN
- China
- Prior art keywords
- matrix
- module
- matrix multiplication
- calculation
- encrypting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
Abstract
The invention discloses safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing, the technical problem to be solved is to overcome the shortcomings of prior art leak data privacy, preferably protects matrix multiplication input data privacy.The present invention by improving after matrix multiplication outsourcing software complete, mainly improve cipher key module, encrypting module, deciphering module;Cipher key module generates key according to matrix size, and key is made up of 4k random vector;Then encrypting module adds the matrix Z using key generation to input matrix X, Y respectively1And Z2, each element method in scrambled matrix X, Y;Computing module calculates the matrix multiplication problem of encryption;Authentication module verifies result of calculation;Deciphering module is according to the final result of calculation of secret key decryption.Can encrypt each element in input matrix X, Y during present invention encryption, protect the privacy of each element, including neutral element number, preferably protect the privacy of input data.
Description
Technical field
The invention belongs to cloud computing security fields, more specifically, it is related to outside a kind of matrix multiplication towards cloud computing
Safe encryption method in packet procedures.
Background technology
Cloud computing provides the user the numerical procedure of economical and efficient, and user can share the computing resource of Cloud Server and deposit
Storage resource, the equipment for making the computing capability of user be no longer limited by them.Therefore, the not enough user of some computing resources can be by
Large-scale calculating is sent to the powerful Cloud Server treatment of computing capability to the mode that usage amount is paid and then saving is calculated as
This.User calculates the mode call outsourcing that the calculating task of oneself is sent to third party's calculating.
Although outsourcing is calculated has many benefits, directly Cloud Server treatment is given calculating new in the presence of some
Safety problem and challenge.Often comprising some sensitive informations such as financial transaction record, Customer Information, individual in the task that outsourcing is calculated
Person health data etc., but Cloud Server is always incredible.Therefore, the topmost problem that outsourcing is calculated is that safety is asked
How topic, i.e., protect the privacy of the inputoutput data of outsourcing calculating task.User terminal will be to input data before outsourcing calculating
Encryption, is decrypted to the result that cloud server end is returned.Secondly, the details of operation of cloud server end is opaque to user terminal
's.Cloud server terminal is perhaps to the economic interests of oneself, reduce calculation times;Meanwhile, hacker can be by various attack patterns
Control Cloud Server, so that altered data, does not perform according to agreement, does not perform even, returns to the result of mistake.Therefore, check
The correctness of cloud server end returning result is that outsourcing calculates Second Problem.
Safely outsourced calculation stress pays close attention to the scientific algorithm that computation complexity is high and data volume is big at this stage.For example it is extensive
Matrix multiplication, matrix inversion, system of linear equations and linear programming, sequence compare.
The form of calculation of matrix multiplication computational problem is Z=XY, and wherein X is dimension m * n matrix, and Y is dimension n × s squares
Battle array, Z is dimension m × s matrixes, and m, n, s are the dimension sizes of matrix.Matrix X, Y are input data, and matrix Z is output data (meter
Calculate result).For the safely outsourced computational algorithm of matrix multiplication, 2014, Lei et al. was in periodical Information Sciences
Roll up and deliver " Achieving security, robust cheating resistance, and high- on page 280 205-217
efficiency for outsourcing large matrix multiplication computation to a
Malicious cloud " (the extensive matrix multiplication of safety, anti-fraud, efficient outsourcing towards malice cloud is calculated).Matrix multiplication
Outsourcing software is completed, and matrix multiplication outsourcing software five modules as shown in figure 1, be made up of, five modules are cipher key module, encryption
Module, computing module, authentication module, deciphering module.Wherein cipher key module, encrypting module, authentication module, deciphering module are arranged on
User terminal.Computing module is arranged on cloud server end.Cipher key module generates key according to matrix size, and key is sent to encryption
Module and deciphering module.The matrix multiplication problem that encrypting module is encrypted using key to the encryption generation of matrix multiplication problem, and
The matrix multiplication problem of encryption is sent to computing module.Computing module receives the matrix multiplication problem of encryption, calculates encryption
Matrix multiplication problem, authentication module is sent to by result of calculation.Authentication module is tested the result of calculation that computing module is returned
Card, if result of calculation is sent to deciphering module by result of calculation by checking, otherwise, returns to computing module and recalculates.Solution
Close module is decrypted to the result of calculation by verifying using key and obtains final result of calculation.The program is comprised the following steps:
The first step, structural matrix multiplication outsourcing software, from input file read in carry out matrix multiplication calculating matrix X and
Matrix Y, X are dimension m * n matrixes, and Y is dimension n × s matrixes, and m, n, s are positive integers.
Second step, cipher key module generates key according to matrix size.
According to m, the value of n, s, wherein m, n, s are the dimension size of matrix, generation 1,2 ..., the displacement of m to 2.1 cipher key modules
Function π1, the permutation function π of 1,2 ..., n2, the permutation function π of 1,2 ..., s3。
2.2 cipher key modules are according to permutation function π1, π2, π3Randomly select m+n+s random value r1,...,rm,rm+1,...,
rm+n,rm+n+1,...,rm+n+s.Generate the elementary transition matrix that m dimension is m × m respectively according to formula (1), (2), (3)
A1,…,Ae,…,Am(1≤e≤m), n dimension is the elementary transition matrix B of n × n1,…,Bf,…,Bn(1≤f≤n), s dimension
Number is the elementary transition matrix C of s × s1,…,Cg,…,Cs(1≤g≤s)。
Wherein Ae(i1,j1) it is matrix AeI-th1Row jth1Column element, Bf(i2,j2) it is matrix BfI-th2Row jth2Column element,
Cg(i3,j3) it is Matrix CgI-th3Row jth3Column element.
2.3 cipher key modules calculate P1=A1×A2×…×Am, P1-1=A1 -1×A2 -1×…×Am -1, P2=B1×B2×…
×Bn, P2 -1=B1 -1×B2 -1×…×Bn -1, P3=C1×C2×…×Cs, P3 -1=C1 -1×C2 -1×…×Cs -1。
The parameter of more than 2.4 generations constitutes key SK={ P1, P2, P3, π1, π2, π3, r1,...,rm+n+s}。
3rd step, encrypting module utilizes key scrambled matrix multiplication problem.
3.1 encrypting modules calculate X '=P1×X×P2 -1, wherein matrix X ' i-th4Row jth4Column element isThat is, matrix X ' i-th4Row jth4Row unit
Element is matrix X π1(i4) row π2(j4) column element is multiplied byObtain.
3.2 encrypting modules calculate Y '=P2×Y×P3-1, wherein matrix Y ' i-th5Row jth5Column element isThat is, matrix Y ' i-th5Row jth5Row
Element is matrix Y π2(i5) row π3(j5) column element is multiplied byObtain.
3.3 encrypting modules are sent to the matrix X ' and Y ' of encryption the computing module of cloud server end.
4th step, computing module calculates the matrix multiplication problem of encryption.
After matrix X ' and Y ' that 4.1 computing modules receive encryption from the encrypting module of user terminal, Z '=X ' × Y ' is calculated.
4.2 authentication modules that result of calculation Z ' is sent to user terminal.
5th step, authentication module checking result of calculation.
5.1 authentication modules generate l random vector ri(i ∈ [1, l]), wherein riIt is the column vector of dimension s × 1, l values are big
It is small to be randomly choosed by authentication module.
5.2 authentication modules verify X ' × (Y ' × ri) whether it is equal to Z ' × ri。
If 5.3 is equal, expression is verified, and authentication module receives result of calculation Z ', turns the 6th step;Otherwise, refusal is calculated
As a result Z ', turns the 4th step.
6th step, deciphering module decrypts final result of calculation.
6.1 according to key P1, P3With the result of calculation Z ' by verifying, deciphering module calculating Z=P1 -1×Z′×P3, obtain
Result of calculation Z.
Found out by the 3rd step 3.1 and 3.2, this matrix multiplication outsourcing scheme only protects non-zero entry in input matrix X and Y
The privacy of element, have ignored the protection of neutral element number, result in data-privacy leakage.
The content of the invention
The technical problem to be solved in the present invention is to overcome the shortcomings of prior art leak data privacy, there is provided it is a kind of towards
Safe encryption method during the matrix multiplication of cloud computing is safely outsourced, compared to currently existing scheme, can preferably protect Matrix Multiplication
Method input data privacy.
The present invention is towards safe encryption method in the matrix multiplication sub-contract management of cloud computing by improving background technology matrix
Matrix multiplication outsourcing software is completed in the safely outsourced computational algorithm of multiplication.Matrix multiplication outsourcing software after improvement is also by key mould
Block, encrypting module, computing module, authentication module, deciphering module composition.Wherein cipher key module, encrypting module, authentication module, solution
Close module is arranged on user terminal.Computing module is arranged on cloud server end.
The technical scheme is that:
The first step, improves matrix multiplication outsourcing software, and the matrix multiplication outsourcing software after improvement is also by cipher key module, encryption
Module, computing module, authentication module, deciphering module composition, wherein computing module, authentication module do not change, cipher key module, plus
Close module, deciphering module are all different from the corresponding module in background technology matrix multiplication outsourcing software.Cipher key module, encryption mould
Block, authentication module, deciphering module are arranged on user terminal, and computing module is arranged on cloud server end.Encrypting module utilizes key pair
The matrix multiplication problem of matrix multiplication problem encryption generation encryption, and the matrix multiplication problem of encryption is sent to computing module.
Computing module receives the matrix multiplication problem of encryption, calculates the matrix multiplication problem of encryption, and result of calculation is sent into checking mould
Block.Authentication module is verified to the result of calculation that computing module is returned, if result of calculation sends result of calculation by checking
To deciphering module, otherwise, return to computing module and recalculate.Deciphering module is using key to the result of calculation solution by verifying
It is close to obtain final result of calculation.Being read in from input file will carry out the matrix X and matrix Y of matrix multiplication calculating.
Second step, cipher key module generates key according to matrix size.
2.1 cipher key modules select a positive integer k according to the value of the dimension m, n, s of matrix, the scope of k values be 2≤k≤
0.01 × min (m, n, s), wherein min (m, n, s) represent m, n, the minimum value in s.
The generation of 2.2 cipher key modules is raw using random function (srand the and rand functions such as in Matlab language and C language)
Into 4k random vector a1,…,ak, b1,…,bk, c1,…,ck, d1,…,dk, wherein a1,…,akFor dimension for m × 1 row to
Amount, b1,…,bk, c1,…,ckFor dimension is the column vector of n × 1, d1,…,dkFor dimension is the column vector of s × 1.Generate above
Vector constitute key SK={ a1,…,ak,b1,…,bk,c1,…,ck,d1,…,dk}。
3rd step, encrypting module utilizes key scrambled matrix multiplication problem.
3.1 encrypting module generator matrix Z1And Z2:
3.2 encrypting modules calculate X '=X+Z1, wherein matrix X ' i-th6Row jth6Column element is X ' (i6,j6)=X (i6,j6)
+Z1(i6,j6)(1≤i6≤m,1≤j6≤ n), that is to say, that i-th6Row jth6Column element is matrix X i-th6Row jth6Column element adds
Upper matrix Z1I-th6Row jth6Column element is obtained.
3.3 encrypting modules calculate Y '=Y+Z2, wherein matrix Y ' i-th7Row jth7Column element is Y ' (i7,j7)=Y (i7,j7)
+Z2(i7,j7)(1≤i7≤n,1≤j7≤ s), that is to say, that matrix Y ' i-th7Row jth7Column element is matrix Y i-th7Row jth7Row
Element adds matrix Z2I-th7Row jth7Column element is obtained.
3.4 encrypting modules are sent to the matrix X ' and Y ' of encryption the computing module of cloud server end.
4th step, computing module calculates the matrix multiplication problem of encryption.
After matrix X ' and Y ' that 4.1 computing modules receive encryption from the encrypting module of user terminal, Z '=X ' × Y ' is calculated.
4.2 authentication modules that result of calculation Z ' is sent to user terminal.
5th step, authentication module checking result of calculation.
5.1 authentication modules generate l random vector ri(i ∈ [1, l]), wherein riIt is the column vector of dimension s × 1, l values are big
It is small to be randomly choosed by authentication module.
5.2 authentication modules verify X ' × (Y ' × ri) whether it is equal to Z ' × ri。
If 5.3 is equal, expression is verified, and authentication module receives result of calculation Z ', turns the 6th step;Otherwise, refusal is calculated
As a result Z ', turns the 4th step.
6th step, deciphering module decrypts final result of calculation.
6.1 deciphering module calculating matrix S:
6.2 deciphering modules calculate Z=Z '-S, obtain result of calculation Z.
Following technique effect can be reached using the present invention:
In order to protect the privacy of input matrix, the present invention is in the 3rd step 3.3 and 3.4 encrypting modules to input matrix X, Y point
Jia Shang not matrix Z1And Z2, encrypted each element in matrix X, Y, protect the privacy of each element, including neutral element
Number, preferably protects the privacy of input data.
Brief description of the drawings
Fig. 1 is the building-block of logic of background technology matrix multiplication outsourcing software.
Fig. 2 is flow chart of the invention.
Specific embodiment
Specific embodiment of the invention is described below.As shown in Fig. 2 the present invention is comprised the following steps:
The first step, improves matrix multiplication outsourcing software, and the matrix X and matrix Y to be calculated are read in from input file.
Second step, cipher key module generates key according to matrix size:
2.1, cipher key module determines positive integer k.
2.2, cipher key module generates 4k vector a at random1,…,ak, b1,…,bk, c1,…,ckAnd d1,…,dk。
3rd step, encrypting module is encrypted to matrix multiplication problem:
3.1, encrypting module is according to the key SK of second step 2.2={ a1,…,ak,b1,…,bk,c1,…,ck,d1,…,dkRaw
Into matrix Z1And Z2。
3.2, matrix X add matrix Z1, realize the encryption to matrix X.
3.3, matrix Y add matrix Z2, realize the encryption to matrix Y.
3.4, encrypting module is sent to the matrix X ' and Y ' of encryption the computing module of cloud server end.
4th step, computing module calculates the matrix multiplication problem of encryption:
4.1, the computing module of Cloud Server performs the calculating to Z '=X ' × Y '.
4.2, Z ' is sent to the authentication module of user terminal.
5th step, authentication module checking result of calculation:
5.1, authentication module generates l random vector ri。
5.2, authentication module checking X ' × (Y ' × ri) whether it is equal to Z ' × ri。
5.3, if equal, expression is verified, and authentication module receives result of calculation Z ', turns the 6th step;Otherwise, refusal is calculated
As a result Z ', turns the 4th step.
6th step, deciphering module decrypts final result of calculation:
6.1, deciphering module is according to the key SK of second step 2.2={ a1,…,ak,b1,…,bk,c1,…,ck,d1,…,dkMeter
Calculate matrix S.
6.2, Z=Z '-S are calculated, obtain final result of calculation Z.
Claims (2)
1. safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing, the method is by matrix multiplication outsourcing software
Complete, matrix multiplication outsourcing software is made up of cipher key module, encrypting module, computing module, authentication module, deciphering module, wherein
Cipher key module, encrypting module, authentication module, deciphering module are arranged on user terminal, and computing module is arranged on cloud server end;It is special
Levy is that safe encryption method is comprised the following steps in a kind of matrix multiplication sub-contract management towards cloud computing:
The first step, improves cipher key module, encrypting module, the deciphering module of matrix multiplication outsourcing software, and being read in from input file will
The matrix X and matrix Y, X for carrying out matrix multiplication calculating are dimension m * n matrixes, and Y is dimension n × s matrixes, and m, n, s are positive integers;
Second step, cipher key module generates key according to matrix size, and method is:
2.1 cipher key modules select a positive integer k according to the value of the dimension m, n, s of matrix;
2.2 cipher key modules generate 4k random vector a using random function1,…,ak, b1,…,bk, c1,…,ck, d1,…,dk,
Wherein a1,…,akFor dimension is the column vector of m × 1, b1,…,bk, c1,…,ckFor dimension is the column vector of n × 1, d1,…,dk
For dimension is the column vector of s × 1;This 4k random vector constitutes key SK={ a1,…,ak,b1,…,bk,c1,…,ck,
d1,…,dk};
3rd step, encrypting module utilizes key scrambled matrix multiplication problem, and method is:
3.1 encrypting module generator matrix Z1And Z2:
3.2 encrypting modules calculate X '=X+Z1, wherein matrix X ' i-th6Row jth6Column element is X ' (i6,j6)=X (i6,j6)+Z1
(i6,j6),1≤i6≤m,1≤j6≤ n, i.e. matrix X ' i-th6Row jth6Column element is matrix X i-th6Row jth6Column element adds square
Battle array Z1I-th6Row jth6Column element;
3.3 encrypting modules calculate Y '=Y+Z2, wherein matrix Y ' i-th7Row jth7Column element is Y ' (i7,j7)=Y (i7,j7)+Z2
(i7,j7),1≤i7≤n,1≤j7≤ s, i.e. matrix Y ' i-th7Row jth7Column element is matrix Y i-th7Row jth7Column element adds square
Battle array Z2I-th7Row jth7Column element;
3.4 encrypting modules are sent to the matrix X ' and Y ' of encryption the computing module of cloud server end;
4th step, computing module calculates the matrix multiplication problem of encryption, and method is:
After matrix X ' and Y ' that 4.1 computing modules receive encryption from the encrypting module of user terminal, Z '=X ' × Y ' is calculated;
4.2 authentication modules that result of calculation Z ' is sent to user terminal;
5th step, authentication module verifies result of calculation, and method is:
5.1 authentication modules generate l random vector ri(i ∈ [1, l]), wherein riBe the column vector of dimension s × 1, l values size by
Authentication module is randomly choosed;
5.2 authentication modules verify X ' × (Y ' × ri) whether it is equal to Z ' × ri;
If 5.3 is equal, expression is verified, and authentication module receives result of calculation Z ', turns the 6th step;Otherwise, result of calculation is refused
Z ', turns the 4th step;
6th step, deciphering module decrypts final result of calculation, and method is:
6.1 deciphering module calculating matrix S:
6.2 deciphering modules calculate Z=Z '-S, obtain result of calculation Z.
2. safe encryption method, its feature in a kind of matrix multiplication sub-contract management towards cloud computing as claimed in claim 1
It is that the scope of the k values is 2≤k≤0.01 × min (m, n, s), wherein min (m, n, s) represents m, n, the minimum value in s.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710032412.7A CN106788980B (en) | 2017-01-16 | 2017-01-16 | Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710032412.7A CN106788980B (en) | 2017-01-16 | 2017-01-16 | Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106788980A true CN106788980A (en) | 2017-05-31 |
CN106788980B CN106788980B (en) | 2019-07-30 |
Family
ID=58946949
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710032412.7A Expired - Fee Related CN106788980B (en) | 2017-01-16 | 2017-01-16 | Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106788980B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108768622A (en) * | 2018-03-30 | 2018-11-06 | 国网河南省电力公司新乡供电公司 | The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing |
CN108768612A (en) * | 2018-06-04 | 2018-11-06 | 湖北工业大学 | A kind of full homomorphic cryptography method based on random unitary matrix during outsourcing calculates |
CN109450625A (en) * | 2018-11-12 | 2019-03-08 | 青岛大学 | The safely outsourced method of extensive Polynomial Expansion Euclidean algorithm |
CN109460536A (en) * | 2018-11-16 | 2019-03-12 | 青岛大学 | The safely outsourced algorithm of extensive matrix operation |
CN110309674A (en) * | 2019-07-04 | 2019-10-08 | 浙江理工大学 | A kind of sort method based on full homomorphic cryptography |
CN110704850A (en) * | 2019-09-03 | 2020-01-17 | 华为技术有限公司 | Artificial intelligence AI model operation method and device |
CN111107076A (en) * | 2019-12-16 | 2020-05-05 | 电子科技大学 | Safe and efficient matrix multiplication outsourcing method |
CN112995189A (en) * | 2021-03-08 | 2021-06-18 | 北京理工大学 | Method for publicly verifying matrix multiplication correctness based on privacy protection |
CN113271293A (en) * | 2021-04-09 | 2021-08-17 | 上海大学 | Verifiable constrained quadratic programming security outsourcing calculation method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
CN104488218A (en) * | 2012-07-05 | 2015-04-01 | 克里普特欧贝西克株式会社 | Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program |
CN105376057A (en) * | 2015-11-13 | 2016-03-02 | 电子科技大学 | Method for solving large-scale linear equation set through cloud outsourcing |
US20160164671A1 (en) * | 2012-02-17 | 2016-06-09 | International Business Machines Corporation | Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management |
-
2017
- 2017-01-16 CN CN201710032412.7A patent/CN106788980B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
US20160164671A1 (en) * | 2012-02-17 | 2016-06-09 | International Business Machines Corporation | Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management |
CN104488218A (en) * | 2012-07-05 | 2015-04-01 | 克里普特欧贝西克株式会社 | Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program |
CN105376057A (en) * | 2015-11-13 | 2016-03-02 | 电子科技大学 | Method for solving large-scale linear equation set through cloud outsourcing |
Non-Patent Citations (2)
Title |
---|
LEI XINYU.ETL: "Cloud Computing Service:The Caseof Large Matrix Determinant Computation", 《IEEE TRANSACTIONS ON SERVICES COMPUTING》 * |
YU YUNPENG.ETL: "efficient,secure and non-interative outsourcing of Large-Scale systems of Linear equations", 《2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS(ICC)》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108768622A (en) * | 2018-03-30 | 2018-11-06 | 国网河南省电力公司新乡供电公司 | The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing |
CN108768612A (en) * | 2018-06-04 | 2018-11-06 | 湖北工业大学 | A kind of full homomorphic cryptography method based on random unitary matrix during outsourcing calculates |
CN108768612B (en) * | 2018-06-04 | 2020-12-18 | 湖北工业大学 | Fully homomorphic encryption method based on random unitary matrix in outsourcing calculation |
CN109450625B (en) * | 2018-11-12 | 2022-01-04 | 青岛大学 | Safe outsourcing method of large-scale polynomial expansion Euclidean algorithm |
CN109450625A (en) * | 2018-11-12 | 2019-03-08 | 青岛大学 | The safely outsourced method of extensive Polynomial Expansion Euclidean algorithm |
CN109460536A (en) * | 2018-11-16 | 2019-03-12 | 青岛大学 | The safely outsourced algorithm of extensive matrix operation |
CN109460536B (en) * | 2018-11-16 | 2023-06-02 | 青岛大学 | Safe outsourcing method for matrix operation |
CN110309674A (en) * | 2019-07-04 | 2019-10-08 | 浙江理工大学 | A kind of sort method based on full homomorphic cryptography |
CN110309674B (en) * | 2019-07-04 | 2021-10-01 | 浙江理工大学 | Ordering method based on fully homomorphic encryption |
CN110704850A (en) * | 2019-09-03 | 2020-01-17 | 华为技术有限公司 | Artificial intelligence AI model operation method and device |
CN110704850B (en) * | 2019-09-03 | 2022-05-10 | 华为技术有限公司 | Artificial intelligence AI model operation method and device |
CN111107076A (en) * | 2019-12-16 | 2020-05-05 | 电子科技大学 | Safe and efficient matrix multiplication outsourcing method |
CN112995189B (en) * | 2021-03-08 | 2022-01-21 | 北京理工大学 | Method for publicly verifying matrix multiplication correctness based on privacy protection |
CN112995189A (en) * | 2021-03-08 | 2021-06-18 | 北京理工大学 | Method for publicly verifying matrix multiplication correctness based on privacy protection |
CN113271293A (en) * | 2021-04-09 | 2021-08-17 | 上海大学 | Verifiable constrained quadratic programming security outsourcing calculation method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106788980B (en) | 2019-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106788980B (en) | Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing | |
Wang et al. | Secure and practical outsourcing of linear programming in cloud computing | |
CN106850221B (en) | Information encryption and decryption method and device | |
CN104396181B (en) | system and method for generating and protecting cryptographic key | |
CN104506313B (en) | A kind of quantum key distribution secrecy Enhancement Method for supporting extensive dynamic change | |
US20150215123A1 (en) | Method and system for homomorphicly randomizing an input | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN109787743A (en) | A kind of full homomorphic cryptography method that can verify that based on matrix operation | |
CN105577368A (en) | Two-way privacy protective system and method for inquiring medical diagnostic service | |
CN104219047B (en) | A kind of method and apparatus of signature verification | |
CN107579813A (en) | information encryption and decryption method and device | |
CN107769910A (en) | A kind of anti-side channel analysis DES means of defences and circuit based on Latch PUF | |
CN102611558A (en) | Magic square-based secret key distribution and identity authentication method of electronic account administrated by multi-users commonly | |
US20230254122A1 (en) | Secret material exchange and authentication cryptography operations | |
CN105897400A (en) | Masking method and device for SM4 algorithm | |
CN105635135A (en) | Encryption system based on attribute sets and relational predicates and access control method | |
CN109460536A (en) | The safely outsourced algorithm of extensive matrix operation | |
CN109214195A (en) | A kind of the SM2 ellipse curve signature sign test hardware system and method for resisting differential power consumption attack | |
CN113626852A (en) | Safe and efficient method, system and application for anonymizing chain elements of unlicensed blocks | |
CN101938354A (en) | Key distribution method based on modular exponentiation and application thereof | |
CN106209371A (en) | It is applied to RSA Algorithm and generates the outsourcing method of key | |
CN107707562A (en) | A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm | |
CN105119929B (en) | Safe module exponent outsourcing method and system under single malice Cloud Server | |
CN107248914B (en) | Novel symmetric encryption system and encryption method on iOS device | |
CN101510875B (en) | Identification authentication method based on N-dimension sphere |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190730 Termination date: 20210116 |
|
CF01 | Termination of patent right due to non-payment of annual fee |