Telecommunications Science ›› 2023, Vol. 39 ›› Issue (12): 110-121.doi: 10.11959/j.issn.1000-0801.2023251

• Research and Development • Previous Articles    

Secure efficient privacy-preserving publicly verifiable outsourced computation scheme for matrix multiplication

Shoudao SUN1, Shen YANG1, Yiheng CHEN1, Qiang WANG2   

  1. 1 State Grid Liaoning Electric Power Co., Ltd.Shenyang Power Supply Company, Shenyang 110002, China
    2 Shenyang Xinlongyuan Electric Meter Instrument Co., Ltd., Shenyang 110111, China
  • Revised:2023-12-10 Online:2023-12-01 Published:2023-12-01
  • Supported by:
    State Grid Co., Ltd.Liaoning Science and Technology Project(5222SY230004)

Abstract:

Outsourced computation allows data owners with limited resources to delegate complex computations to resource-rich cloud servers.Matrix multiplication has important applications in scientific computing and cryptography.Verifiable outsourced computation for matrix multiplication enables data owners to outsource the matrix M and the request vector x to untrusted cloud servers for multiplication computation, while verifying the correctness and integrity of the computation results returned by the cloud server.However, existing solutions fail to simultaneously address the following issues: privacy of the outsourced matrix M, privacy of the request vector x, lack of support for public verification, and inefficiency for practical applications.To tackle these problems, proposes a secure efficient privacy-preserving publicly verifiable outsourced computation scheme for matrix multiplication was proposed, and formal definitions and security definitions for the model were provided.Matrix blinding techniques were used to preserve the privacy of the outsourced matrix M and the request vector x, while algebraic pseudorandom functions were employed to achieve public verification of the computation results and overall efficiency of the scheme.Theoretical and experimental results demonstrate that compared with the existing schemes, the proposed scheme not only guarantees the privacy of outsourced matrix M and request vector x, but also supports public verification, which offers more comprehensive functionality.At the same time, the overall computation efficiency of the proposed scheme is higher, which can improve at least 14% compared with existing schemes, and has higher practical value.

Key words: verifiable computation, privacy-preserving, public verification, cloud computing

CLC Number: 

No Suggested Reading articles found!