...
首页> 外文期刊>International journal of wireless and mobile computing >Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation
【24h】

Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation

机译:基于相似度变换的矩阵相乘计算云外包计算安全协议

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

>With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient.
机译:>随着科学和商业应用中云计算范例的出现,将计算外包到云已经成为云计算时代的流行应用。但是,这种计算方式带来了一些新的安全问题和挑战,例如输入/输出隐私和结果可验证性。在本文中,我们使用矩阵的相似变换来设计用于矩阵乘法计算的安全可验证且实用的外包协议。与现有的外包协议相比,我们的协议在效率和安全性上都有明显的提高。为了检查从云返回的结果的正确性,采用了有效的验证算法。计算复杂度分析表明我们的协议是高效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号