Abstract
Computation outsourcing enables clients to outsource their expensive computational tasks to the cloud servers in pay-per-use manners. However once the tasks are outsourced, the clients will lose controls of the data and the calculation methods, which may result in severe security and reliability issues. The existed matrix encryption schemes for outsourcing application can be divided into two categories: encryption based schemes and disguising based schemes. It is impractical to be carried out in the cloud scenario that encryption based schemes require expensive encryption operations. The existed disguising based schemes ignore the disturbance such as errors or tolerances that are always introduced into science and engineering computations or analysis. In this paper, we proposed a new random sparse unitary matrix generation algorithm to overcome the disturbance problem, and reconstruct a new error-bounded matrix disguising schemes for the outsourcing matrix computation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, pp. 169–178 (2009)
Atallah, M.J., Pantazopoulos, K.N., Spafford, E.H.: Secure outsourcing of some computations. Department of Computer Sciences. CSD-TR-96-074, Pudue University (1996)
Zhou, K., Ren, J.: ASO: cost-aware secure outsourcing of general computational problems (2015). arXiv preprint arXiv:1511.02375
Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–180 (1978)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Armknecht, F., Sadeghi, A.R.: A new approach for algebraically homomorphic encryption. IACR Cryptology ePrint Archive (2008)
Kawachi, A., Tanaka, K., Xagawa, K.: Multi-bit cryptosystems based on lattice problems. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 315–329. Springer, Heidelberg (2007). doi:10.1007/978-3-540-71677-8_21
Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13190-5_2
Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22792-9_29
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from standard LWE. SIAM J. Comput. 43(2), 831–871 (2014)
Kiltz, E., Mohassel, P., Weinreb, E., Franklin, M.: Secure linear algebra using linearly recurrent sequences. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 291–310. Springer, Heidelberg (2007). doi:10.1007/978-3-540-70936-7_16
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 501–512. ACM (2012)
Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., et al.: Secure outsourcing of scientific computations. Adv. Comput. 54, 216–272 (2002)
Benjamin, D., Atallah, M.: Private and cheating-free outsourcing of algebraic computations. In: 6th Conference on Privacy, Security, and Trust (PST), New Brunswick (2008)
Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59 (2010)
Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: INFOCOM (2011)
Yu, J., Wang, X., Gao, W.: Improvement and applications of secure outsourcing of scientific computations. J Ambient Intell. Hum. Comput. 6, 763–772 (2015)
Hu, X., Tang, C.: Secure outsourced computation of the characteristic polynomial and eigen values of matrix. J. Cloud Comput. 4, 7 (2015)
Hu, X., et al.: Verifiable and secure outsourcing of matrix calculation and its application. Scientia sinica: Inf. 43(7), 842–852 (2013)
Lütkepohl, H.: Handbook of Matrices. Wiley, New York (1996)
Zhang, X.: Matrix Analysis and Applications. Tsinghua and Springer Publishing house, Beijing (2004)
Acknowledgments
This work is supported by the HBUT PHD Fund BSQD12027 and the Hubei Provincial Educational Research Plan D20131404.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Chen, Y., Zhang, M., Xu, C. (2018). Reliable Homomorphic Matrix Disguising Scheme. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_66
Download citation
DOI: https://doi.org/10.1007/978-3-319-61542-4_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61541-7
Online ISBN: 978-3-319-61542-4
eBook Packages: EngineeringEngineering (R0)