Skip to main content

2017 | OriginalPaper | Buchkapitel

New Publicly Verifiable Computation for Batch Matrix Multiplication

verfasst von : Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Xiaofeng Chen

Erschienen in: Green, Pervasive, and Cloud Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the prevalence of cloud computing, the resource constrained clients are trended to outsource their computation-intensive tasks to the cloud server. Although outsourcing computation paradigm brings many benefits for both clients and cloud server, it causes some security challenges. In this paper, we focus on the outsourcing computation of matrix multiplication, and propose a new publicly verifiable computation scheme for batch matrix multiplication. Different from traditional matrix computation outsourcing model, the outsourcing task of our scheme is to compute \(MX_{i}\) for group of clients, where \(X_{i}\) is a private matrix chosen by different clients and M is a public matrix given by a data center beforehand. Based on the two techniques of privacy-preserving matrix transformation and matrix digest, our scheme can protect the secrecy of the client’s private matrix \(X_{i}\) and dramatically reduce the computation cost in both the key generation and the compute phases. The security analysis shows that the proposed scheme can also achieve the desired security properties under the co-CDH assumption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, X.: Introduction to secure outsourcing computation. Synth. Lect. Inf. Secur. Priv. Trust 8, 1–93 (2016)MathSciNet Chen, X.: Introduction to secure outsourcing computation. Synth. Lect. Inf. Secur. Priv. Trust 8, 1–93 (2016)MathSciNet
2.
Zurück zum Zitat Joshi, K.P., Yesha, Y., Finin, T.: Automating cloud services life cycle through semantic technologies. IEEE Trans. Serv. Comput. 7, 109–122 (2012)CrossRef Joshi, K.P., Yesha, Y., Finin, T.: Automating cloud services life cycle through semantic technologies. IEEE Trans. Serv. Comput. 7, 109–122 (2012)CrossRef
3.
Zurück zum Zitat Paik, I., Chen, W., Huhns, M.N.: A scalable architecture for automatic service composition. IEEE Trans. Serv. Comput. 7, 82–95 (2014)CrossRef Paik, I., Chen, W., Huhns, M.N.: A scalable architecture for automatic service composition. IEEE Trans. Serv. Comput. 7, 82–95 (2014)CrossRef
4.
Zurück zum Zitat Park, K.W., Han, J., Chung, J.W., Park, K.H.: Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6, 300–313 (2013)CrossRef Park, K.W., Han, J., Chung, J.W., Park, K.H.: Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6, 300–313 (2013)CrossRef
5.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5, 220–232 (2012)CrossRef Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5, 220–232 (2012)CrossRef
6.
Zurück zum Zitat Wang, C., Zhang, B., Ren, K., Roveda, J.M.: Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1, 166–177 (2013)CrossRef Wang, C., Zhang, B., Ren, K., Roveda, J.M.: Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1, 166–177 (2013)CrossRef
7.
Zurück zum Zitat Chen, X., Huang, X., Li, J., Ma, J.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10, 69–78 (2015)CrossRef Chen, X., Huang, X., Li, J., Ma, J.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10, 69–78 (2015)CrossRef
8.
Zurück zum Zitat Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)CrossRef Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)CrossRef
9.
Zurück zum Zitat Lei, X., Liao, X., Huang, T., Li, H.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1, 1 (2013) Lei, X., Liao, X., Huang, T., Li, H.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1, 1 (2013)
10.
Zurück zum Zitat Lei, X., Liao, X., Huang, T., Li, H.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)CrossRef Lei, X., Liao, X., Huang, T., Li, H.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)CrossRef
11.
Zurück zum Zitat Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM Conference on Computer and Communications Security, pp. 501–512(2012) Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM Conference on Computer and Communications Security, pp. 501–512(2012)
12.
Zurück zum Zitat Zhang, L.F., Safavi-Naini, R.: Verifiable delegation of computations with storage-verification trade-off. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 112–129. Springer, Cham (2014). doi:10.1007/978-3-319-11203-9_7 Zhang, L.F., Safavi-Naini, R.: Verifiable delegation of computations with storage-verification trade-off. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 112–129. Springer, Cham (2014). doi:10.​1007/​978-3-319-11203-9_​7
13.
Zurück zum Zitat Zhang, Y., Blanton, M.: Efficient secure and verifiable outsourcing of matrix multiplications. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 158–178. Springer, Cham (2014). doi:10.1007/978-3-319-13257-0_10 Zhang, Y., Blanton, M.: Efficient secure and verifiable outsourcing of matrix multiplications. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 158–178. Springer, Cham (2014). doi:10.​1007/​978-3-319-13257-0_​10
14.
Zurück zum Zitat Elkhiyaoui, K., Önen, M., Azraoui, M., Molva, R.: Efficient techniques for publicly verifiable delegation of computation. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, 30 May–3 June 2016, pp. 119–128 (2016) Elkhiyaoui, K., Önen, M., Azraoui, M., Molva, R.: Efficient techniques for publicly verifiable delegation of computation. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, 30 May–3 June 2016, pp. 119–128 (2016)
15.
Zurück zum Zitat Sheng, G., Tang, C., Gao, W., Yin, Y.: MD-\(\cal{VC}_{Matrix}\): an efficient scheme for publicly verifiable computation of outsourced matrix multiplication. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 349–362. Springer, Cham (2016). doi:10.1007/978-3-319-46298-1_23 CrossRef Sheng, G., Tang, C., Gao, W., Yin, Y.: MD-\(\cal{VC}_{Matrix}\): an efficient scheme for publicly verifiable computation of outsourced matrix multiplication. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 349–362. Springer, Cham (2016). doi:10.​1007/​978-3-319-46298-1_​23 CrossRef
16.
Zurück zum Zitat Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25 CrossRef Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-14623-7_​25 CrossRef
17.
Zurück zum Zitat Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28914-9_24 CrossRef Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-28914-9_​24 CrossRef
18.
Zurück zum Zitat Salinas, S.: Efficient secure outsourcing of large-scale linear systems of equations, pp. 1035–1043 (2015) Salinas, S.: Efficient secure outsourcing of large-scale linear systems of equations, pp. 1035–1043 (2015)
Metadaten
Titel
New Publicly Verifiable Computation for Batch Matrix Multiplication
verfasst von
Xiaoyu Zhang
Tao Jiang
Kuan-Ching Li
Xiaofeng Chen
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-57186-7_5

Premium Partner