Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination

With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. At p...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024035
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529552518512640
author ZHANG Tianpeng
REN Zhiyu
DU Xuehui
WANG Haichao
author_facet ZHANG Tianpeng
REN Zhiyu
DU Xuehui
WANG Haichao
author_sort ZHANG Tianpeng
collection DOAJ
description With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. At present, the sparse matrix multiplication encryption method is used to protect the privacy of data in the matrix multiplication verifiable calculation scheme. After analyzing the sparse matrix encryption algorithm, it is found that there are two challenges. The one is that the row or column common factor leaks the row or column data of the original matrix. The other is that the zero element leaks the statistic information of the zero element of the original matrix. Meanwhile,the existing scheme is also not ideal for the verification efficiency of cloud server computing results.Aiming at the challenge of data privacy protection, the designed batch matrix multiplication verifiable computation scheme uses triple perturbation encryption algorithm to achieve stronger privacy protection without increasing the computational complexity of encryption and decryption. Specifically, a special upper or lower triangular sparse matrix is constructed to add double perturbation (multiplicative perturbation and additive perturbation) to protect row or column data, and a special additive sparse matrix is constructed to add a single perturbation (additive perturbation) to protect zero element information. Aiming at the challenge of verification efficiency of cloud server computing results, the scheme uses matrix linear combination technology to realize batch verification of calculation results. The verification efficiency is increased by about 50 times and increases with the increase of the number of matrices. Performance analysis shows that this scheme does not increase the client encryption and decryption overhead and improves the efficiency of result verification.
format Article
id doaj-art-ab20b10645a649198ed3a4ebc01ba87a
institution Kabale University
issn 2096-109X
language English
publishDate 2024-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-ab20b10645a649198ed3a4ebc01ba87a2025-01-15T03:17:06ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-04-011012113263897223Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combinationZHANG TianpengREN ZhiyuDU XuehuiWANG HaichaoWith the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. At present, the sparse matrix multiplication encryption method is used to protect the privacy of data in the matrix multiplication verifiable calculation scheme. After analyzing the sparse matrix encryption algorithm, it is found that there are two challenges. The one is that the row or column common factor leaks the row or column data of the original matrix. The other is that the zero element leaks the statistic information of the zero element of the original matrix. Meanwhile,the existing scheme is also not ideal for the verification efficiency of cloud server computing results.Aiming at the challenge of data privacy protection, the designed batch matrix multiplication verifiable computation scheme uses triple perturbation encryption algorithm to achieve stronger privacy protection without increasing the computational complexity of encryption and decryption. Specifically, a special upper or lower triangular sparse matrix is constructed to add double perturbation (multiplicative perturbation and additive perturbation) to protect row or column data, and a special additive sparse matrix is constructed to add a single perturbation (additive perturbation) to protect zero element information. Aiming at the challenge of verification efficiency of cloud server computing results, the scheme uses matrix linear combination technology to realize batch verification of calculation results. The verification efficiency is increased by about 50 times and increases with the increase of the number of matrices. Performance analysis shows that this scheme does not increase the client encryption and decryption overhead and improves the efficiency of result verification.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024035triple perturbationlinear combinationenhanced privacyimproved efficiencyverifiable computation
spellingShingle ZHANG Tianpeng
REN Zhiyu
DU Xuehui
WANG Haichao
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
网络与信息安全学报
triple perturbation
linear combination
enhanced privacy
improved efficiency
verifiable computation
title Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
title_full Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
title_fullStr Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
title_full_unstemmed Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
title_short Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
title_sort verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
topic triple perturbation
linear combination
enhanced privacy
improved efficiency
verifiable computation
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024035
work_keys_str_mv AT zhangtianpeng verifiablecomputationschemeofbatchmatrixmultiplicationbasedontripleperturbationandlinearcombination
AT renzhiyu verifiablecomputationschemeofbatchmatrixmultiplicationbasedontripleperturbationandlinearcombination
AT duxuehui verifiablecomputationschemeofbatchmatrixmultiplicationbasedontripleperturbationandlinearcombination
AT wanghaichao verifiablecomputationschemeofbatchmatrixmultiplicationbasedontripleperturbationandlinearcombination