VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The highly development of Internet and cloud computing technology makes it possible to share computing power, storage and data. Cloud computing makes users with limited computing resources be able to carry out large computational tasks with the help of cloud. but security is a major concern that hinders the widespread use of outsourcing computing. We focus on outsourcing large matrix multiplication in this paper. Firstly, we exploit Chinese Remainder Theorem(CRT) to construct a large matrix multiplication outsourcing protocol which is highly efficient in the malicious cloud model. Then formal security proof and extensive performance evaluation show that our protocol achieves a higher security level i.e., information-theoretic security for input privacy and adaptive chosen ciphertext attack (CCA2) security for output privacy). Compared with previous works, users in the proposed protocol are able to verify the results received from the cloud with tiny error rate.

Original languageEnglish
Title of host publication2018 3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538681879
DOIs
StatePublished - 3 Dec 2018
Event3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018 - Shanghai, China
Duration: 18 Oct 201819 Oct 2018

Publication series

Name2018 3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018 - Proceedings

Conference

Conference3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018
Country/TerritoryChina
CityShanghai
Period18/10/1819/10/18

Keywords

  • Cloud computing
  • Large Matrix multiplication
  • Privacy-Preserving
  • Verifiable

Fingerprint

Dive into the research topics of 'VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication'. Together they form a unique fingerprint.

Cite this