Secure outsourcing of large matrix determinant computation
Jiayang LIU, Jingguo BI, Mu LI
Secure outsourcing of large matrix determinant computation
Cloud computing provides the capability to connect resource-constrained clients with a centralized and shared pool of resources, such as computational power and storage on demand. Large matrix determinant computation is almost ubiquitous in computer science and requires largescale data computation. Currently, techniques for securely outsourcing matrix determinant computations to untrusted servers are of utmost importance, and they have practical value as well as theoretical significance for the scientific community. In this study, we propose a secure outsourcing method for large matrix determinant computation. We employ some transformations for privacy protection based on the original matrix, including permutation and mix-row/mixcolumn operations, before sending the target matrix to the cloud. The results returned from the cloud need to be decrypted and verified to obtain the correct determinant. In comparison with previously proposed algorithms, our new algorithm achieves a higher security levelwith greater cloud efficiency. The experimental results demonstrate the efficiency and effectiveness of our algorithm.
cloud computing / large-scale data computation / matrix determinant computation / secure outsourcing
[1] |
Gentry C. A fully homomorphic encryption scheme. Doctoral Dissertation, Stanford University, 2009.
CrossRef
Google scholar
|
[2] |
Parno B, Howell J, Gentry C, Raykova M. Pinocchio: nearly practical verifiable computation. In: Proceedings of 2013 IEEE Symposium on Security and Privacy. 2013, 238–252
CrossRef
Google scholar
|
[3] |
Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. SIAM Journal on Computing, 2014, 43(2): 831–871
CrossRef
Google scholar
|
[4] |
Doröz Y, öztürk E, Sunar B. Accelerating fully homomorphic encryption in hardware. IEEE Transactions on Computers, 2015, 64(6): 1509–1521
|
[5] |
Alagic G, Dulek Y, Schaffner C, Speelman F. Quantum fully homomorphic encryption with verification. In: Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security. 2017, 438–467
CrossRef
Google scholar
|
[6] |
López-Alt A, Tromer E, Vaikuntanathan V. Multikey fully homomorphic encryption and applications. SIAM Journal on Computing, 2017, 46(6): 1827–1892
CrossRef
Google scholar
|
[7] |
Boneh D, Gennaro R, Goldfeder S, Jain A, Kim S, Rasmussen P M R, Sahai A. Threshold cryptosystems from threshold fully homomorphic encryption. In: Proceedings of the 38th Annual International Cryptology Conference. 2018, 565–596
CrossRef
Google scholar
|
[8] |
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, 89–98
CrossRef
Google scholar
|
[9] |
Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography. 2011, 53–70
CrossRef
Google scholar
|
[10] |
Lewko A B, Waters B. Decentralizing attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2011, 568–588
CrossRef
Google scholar
|
[11] |
Hu C, Zhang N, Li H, Cheng X, Liao X. Body area network security: a fuzzy attribute-based signcryption scheme. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 37–46
CrossRef
Google scholar
|
[12] |
Itkis G, Shen E, Varia M, Wilson D, Yerukhimovich A. Boundedcollusion attribute-based encryption from minimal assumptions. In: Proceedings of the 20th International Conference on Practice and Theory in Public Key Cryptography. 2017, 67–87
CrossRef
Google scholar
|
[13] |
Phuong T V X, Ning R, Xin C, Wu H. Puncturable attribute-based encryption for secure data delivery in internet of things. In: Proceedings of 2018 IEEE Conference on Computer Communications. 2018, 1511–1519
|
[14] |
Attrapadung N. Unbounded dynamic predicate compositions in attribute-based encryption. In: Proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2019, 34–67
CrossRef
Google scholar
|
[15] |
Xu S, Yang G, Mu Y. Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Information Sciences, 2019, 479: 116–134
CrossRef
Google scholar
|
[16] |
Li J, Yu Q, Zhang Y, Shen J. Key-policy attribute-based encryption against continual auxiliary input leakage. Information Sciences, 2019, 470: 175–188
CrossRef
Google scholar
|
[17] |
Cui J, Zhou H, Xu Y, Zhong H. OOABKS: online/offline attributebased encryption for keyword search in mobile cloud. Information Sciences, 2019, 489: 63–77
CrossRef
Google scholar
|
[18] |
Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations. In: Proceedings of the 2nd International Conference on Theory of Cryptography. 2005, 264–282
CrossRef
Google scholar
|
[19] |
Chen X, Li J, Ma J, Tang Q, Lou W. New algorithms for secure outsourcing of modular exponentiations. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(9): 2386–2396
CrossRef
Google scholar
|
[20] |
Zhou K, Afifi M H, Ren J. ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile clou computing. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2518–2531
CrossRef
Google scholar
|
[21] |
Atallah M J, Frikken K B. Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. 2010, 48–59
CrossRef
Google scholar
|
[22] |
Lei X, Liao X, Huang T, Heriniaina F. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Information Sciences, 2014, 280: 205–217
CrossRef
Google scholar
|
[23] |
Lei X, Liao X, Huang T, Li H. Cloud computing service: the case of large matrix determinant computation. IEEE Transactions on Services Computing, 2015, 8(5): 688–700
CrossRef
Google scholar
|
[24] |
Wang C, Ren K, Wang J, Wang Q. Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1172–1181
CrossRef
Google scholar
|
[25] |
Chen X, Huang X, Li J, Ma J, Lou W, Wong D S. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 69–78
CrossRef
Google scholar
|
[26] |
Hu C, Alhothaily A, Alrawais A, Cheng X, Sturtivant C, Liu H. A secure and verifiable outsourcing scheme for matrix inverse computation. In: Proceedings of IEEE Conference on Computer Communications. 2017, 1–9
CrossRef
Google scholar
|
[27] |
Zhang S, Li H, Jia K, Dai Y S, Zhao L. Efficient secure outsourcing computation of matrix multiplication in cloud computing. In: Proceedings of 2016 IEEE Global Communications Conference. 2016, 1–6
CrossRef
Google scholar
|
[28] |
Sun Y, Yu Y, Li X, Zhang K, Qian H, Zhou Y. Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations. In: Proceedings of the 21st Australasian Conference on Information Security and Privacy. 2016, 293–309
CrossRef
Google scholar
|
[29] |
Zhou X, Ding Y, Wang Z, Li X, Ye J, Xu Z. Secure outsourcing algorithm of polynomials in cloud computing. In: Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering. 2016, 46–51
CrossRef
Google scholar
|
[30] |
Jiang X, Kim M, Lauter K E, Song Y. Secure outsourced matrix computation and application to neural networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 1209–1222
CrossRef
Google scholar
|
[31] |
Ren Y, Ding N, Wang T Y, Lu H, Gu D. New algorithms for verifiable outsourcing of bilinear pairings. Science China Information Sciences, 2016, 59(9): 99103
CrossRef
Google scholar
|
[32] |
Luo X, Yang X, Niu X. An efficient and secure outsourcing algorithm for bilinear pairing computation. In: Proceedings of the 5th International Conference on Emerging Internetworking, Data & Web Technologies. 2017, 328–339
CrossRef
Google scholar
|
[33] |
Fu S, Yu Y, Xu M. Practical privacy-preserving outsourcing of largescale matrix determinant computation in the cloud. In: Proceedings of International Conference on Cloud Computing and Security. 2017, 3–15
CrossRef
Google scholar
|
[34] |
Li A, Du W, Li Q. Privacy-preserving outsourcing of large-scale nonlinear programming to the cloud. In: Proceedings of International Conference on Security and Privacy in Communication Networks. 2018, 569–587
CrossRef
Google scholar
|
[35] |
Wang C, Ren K,Wang J. Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Transactions on Computers, 2016, 65(1): 216–229
CrossRef
Google scholar
|
[36] |
Cao Z, Liu L. A note on two schemes for secure outsourcing of linear programming. International Journal of Network Security, 2017, 19(2): 323–326
|
[37] |
Ren Y, Ding N, Zhang X, Lu H, Gu D. Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016, 293–303
CrossRef
Google scholar
|
[38] |
Ye J, Xu Z, Ding Y. Secure outsourcing of modular exponentiations in cloud and cluster computing. Cluster Computing, 2016, 19(2): 811–820
CrossRef
Google scholar
|
[39] |
Cai J, Ren Y, Jiang T. Verifiable outsourcing computation of modular exponentiations with single server. International Journal of Network Security, 2017, 19(3): 449–457
|
[40] |
Zhao L, Zhang M, Shen H, Zhang Y, Shen J. Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server. KSII Transactions on Internet and Information Systems, 2017, 11(2): 826–845
CrossRef
Google scholar
|
[41] |
Liu X, Choo K K R, Deng R H, Lu R, Weng J. Efficient and privacypreserving outsourced calculation of rational numbers. IEEE Transactions on Dependable and Secure Computing, 2018, 15(1): 27–39
CrossRef
Google scholar
|
[42] |
Salinas S, Luo C, Chen X, Liao W, Li P. Efficient secure outsourcing of large-scale sparse linear systems of equations. IEEE Transactions on Big Data, 2018, 4(1): 26–39
CrossRef
Google scholar
|
[43] |
Pan S, Zheng F, Zhu W, Wang Q. Harnessing the cloud for secure and efficient outsourcing of non-negative matrix factorization. In: Proceedings of 2018 IEEE Conference on Communications and Network Security. 2018, 1–9
CrossRef
Google scholar
|
[44] |
Chen Z, Fu A, Xiao K, Su M, Yu Y, Wang Y. Secure and verifiable outsourcing of large-scale matrix inversion without precondition in cloud computing. In: Proceedings of 2018 IEEE International Conference on Communications. 2018, 1–6
CrossRef
Google scholar
|
[45] |
Zhang K, Luo C, Li P. Secure outsourcing of matrix convolutions. In: Proceedings of 2018 IEEE International Conference on Communications. 2018, 1–6
CrossRef
Google scholar
|
[46] |
Su Q, Yu J, Tian C, Zhang H, Hao R. How to securely outsource the inversion modulo a large composite number. Journal of Systems and Software, 2017, 129: 26–34
CrossRef
Google scholar
|
[47] |
Liu X, Qin B, Deng R H, Li Y. An efficient privacy-preserving outsourced computation over public data. IEEE Transactions on Services Computing, 2017, 10(5): 756–770
CrossRef
Google scholar
|
[48] |
Luo C, Zhang K, Salinas S, Li P. Efficient privacy-preserving outsourcing of large-scale QR factorization. In: Proceedings of 2017 IEEE Trustcom/BigDataSE/ICESS. 2017, 917–924
CrossRef
Google scholar
|
[49] |
Liu X, Qin B, Deng R H, Lu R, Ma J. A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. IEEE Transactions on Computers, 2016, 65(12): 3567–3579
CrossRef
Google scholar
|
[50] |
Zhou K, Ren J. Secure outsourcing of scalar multiplication on elliptic curves. In: Proceedings of 2016 IEEE International Conference on Communications. 2016, 1–5
CrossRef
Google scholar
|
[51] |
Zhang J, Yang Y, Wang Z. Outsourcing large-scale systems of linear matrix equations in cloud computing. In: Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems. 2016, 438–447
CrossRef
Google scholar
|
[52] |
Peng B. The determinant: a means to calculate volume. Recall, 2007, 21: a22
|
[53] |
Gerald C F, Wheatley P O. Applied Numerical Analysis. 7th ed. Reading, MA, USA: Addison-Wesley, 2003
|
[54] |
Goldreich O, Micali S, Wigderson A. How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing. 1987, 218–229
CrossRef
Google scholar
|
[55] |
Golle P, Mironov I. Uncheatable distributed computations. In: Proceedings of the Cryptographer’s Track at RSA Conference. 2001, 425–440
CrossRef
Google scholar
|
[56] |
Canetti R, Riva B, Rothblum G N. Practical delegation of computation using multiple servers. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. 2011, 445–454
CrossRef
Google scholar
|
[57] |
Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th Annual Cryptology Conference. 2010, 465–482
CrossRef
Google scholar
|
[58] |
Lyndon R C, Schupp P E, Lyndon R, Schupp P. Combinatorial Group Theory. Berlin, Germany: Springer-Verlag, 1977
|
[59] |
Motwani R, Raghavan P. Randomized Algorithms. Cambridge, U.K.: Cambridge University Press, 1995
CrossRef
Google scholar
|
[60] |
Chen Y, Nguyen P Q. Faster algorithms for approximate common divisors: breaking fully-homomorphic-encryption challenges over the integers. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2012, 502–519
CrossRef
Google scholar
|
/
〈 | 〉 |