2019
DOI: 10.1109/access.2019.2913591
|View full text |Cite
|
Sign up to set email alerts
|

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

Abstract: With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 19 publications
(24 citation statements)
references
References 40 publications
(43 reference statements)
0
24
0
Order By: Relevance
“…any verifier (not necessarily the client) can assess the correctness of the server's results. The main technique involved in our scheme essentially can be treated as an improvement of Zhang et al 's technique [22] and Chen et al 's technique [23], which makes our scheme superior in the following three aspects: 1) Our scheme provides an adjustable encryption method based on successively sparse unimodular matrix transformations. That is, we can adjust the number of sparse unimodular matrices in the scheme to balance security and efficiency to match the different application scenarios.…”
Section: Our Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…any verifier (not necessarily the client) can assess the correctness of the server's results. The main technique involved in our scheme essentially can be treated as an improvement of Zhang et al 's technique [22] and Chen et al 's technique [23], which makes our scheme superior in the following three aspects: 1) Our scheme provides an adjustable encryption method based on successively sparse unimodular matrix transformations. That is, we can adjust the number of sparse unimodular matrices in the scheme to balance security and efficiency to match the different application scenarios.…”
Section: Our Contributionsmentioning
confidence: 99%
“…gcd(det(A T A), q) = 1). Also, the existing outsourcing algorithms [22,28] for matrix inversion only detect the cloud server's misbehavior with a certain probability and thus do not achieve the optimal verifiability 1. Another direction is along the way of securely outsourcing LSLE [23,29].…”
Section: Main Scheme a Bird's-eye View Of The Main Ideamentioning
confidence: 99%
See 3 more Smart Citations