Jisuanji kexue yu tansuo (Jan 2020)

Security Outsourcing Algorithms by Unimodular Matrix Encryption Method

  • ZHANG Shengxia, TIAN Chengliang

DOI
https://doi.org/10.3778/j.issn.1673-9418.1901011
Journal volume & issue
Vol. 14, no. 1
pp. 73 – 82

Abstract

Read online

The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also increasingly highlighted. The problem of hiding the number of zero elements in the original matrix is one of them. However, there are few researches on it, and the existing researches can only protect the position of zero elements. There is no encryption method aiming at protecting the number of zero elements and at the same time achieving high efficiency, which is very unsafe in the cloud computing. To solve this problem, from the perspective of algorithm, the encryption method of permutation matrix is improved, and a new algorithm of secure outsourcing MMC, MIC and MDC is designed. The algorithm extends the algebraic structure to the finite domain. Firstly, the initial matrix is permuted randomly, then transformed by the unimodular matrix, and the encrypted matrix is sent to the cloud server. The cloud computes it and returns the results to the client. The client decrypts and verifies it. Through theoretical proof, the algorithm not only protects the number of zero elements of the original matrix, but also achieves the purposes of correctness, privacy and verifiability. Finally, experiments show that the encryption method based on unimodular matrix is efficient.

Keywords