Title | ||
---|---|---|
VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication |
Abstract | ||
---|---|---|
The highly development of Internet and cloud computing technology makes it possible to share computing power, storage and data. Cloud computing makes users with limited computing resources be able to carry out large computational tasks with the help of cloud. but security is a major concern that hinders the widespread use of outsourcing computing. We focus on outsourcing large matrix multiplication in this paper. Firstly, we exploit Chinese Remainder Theorem(CRT) to construct a large matrix multiplication outsourcing protocol which is highly efficient in the malicious cloud model. Then formal security proof and extensive performance evaluation show that our protocol achieves a higher security level i.e., information-theoretic security for input privacy and adaptive chosen ciphertext attack (CCA2) security for output privacy). Compared with previous works, users in the proposed protocol are able to verify the results received from the cloud with tiny error rate. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/SSIC.2018.8556689 | 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) |
Keywords | DocType | ISBN |
Cloud computing,Large Matrix multiplication,Privacy-Preserving,Verifiable | Conference | 978-1-5386-8188-6 |
Citations | PageRank | References |
0 | 0.34 | 12 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Liang Hui | 1 | 0 | 0.34 |
Xiaolei Dong | 2 | 668 | 41.75 |
Jiachen Shen | 3 | 3 | 2.43 |
Zhenfu Cao | 4 | 2650 | 177.89 |
Hongyuan Chen | 5 | 0 | 0.68 |
Yunong Liang | 6 | 0 | 0.34 |