[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108768622A - The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing - Google Patents

The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing Download PDF

Info

Publication number
CN108768622A
CN108768622A CN201810297907.7A CN201810297907A CN108768622A CN 108768622 A CN108768622 A CN 108768622A CN 201810297907 A CN201810297907 A CN 201810297907A CN 108768622 A CN108768622 A CN 108768622A
Authority
CN
China
Prior art keywords
matrix
module
local client
calculation
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810297907.7A
Other languages
Chinese (zh)
Inventor
刘祥
闫晟瑄
庞小澎
苏浩
张燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Xinxiang Power Supply Co of State Grid Henan Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Xinxiang Power Supply Co of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Xinxiang Power Supply Co of State Grid Henan Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810297907.7A priority Critical patent/CN108768622A/en
Publication of CN108768622A publication Critical patent/CN108768622A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种云计算中矩阵行列式的安全外包计算加密方法,利用矩阵行列式的恒等变换以及分块矩阵的相关性质,提出了一种全新的矩阵行列式外包计算的加密方法,保证了矩阵中每一个数据元素的安全性以及运算结果的可验证性;本发明由密钥模块、加密模块、计算模块、验证模块和解密模块构成,其中密钥模块、加密模块、验证模块和解密模块设置在用户本地客户端,计算模块设置在云端服务器上,将复杂计算在云端服务器上进行,降低了算法的时间复杂度,极大的提高了算法的效率。

The invention discloses a secure outsourcing calculation encryption method of matrix determinant in cloud computing, and proposes a brand-new encryption method of matrix determinant outsourcing calculation by using identity transformation of matrix determinant and related properties of block matrix, The security of each data element in the matrix and the verifiability of the operation results are guaranteed; the present invention is composed of a key module, an encryption module, a calculation module, a verification module and a decryption module, wherein the key module, the encryption module, the verification module and The decryption module is set on the user's local client, the calculation module is set on the cloud server, and complex calculations are performed on the cloud server, which reduces the time complexity of the algorithm and greatly improves the efficiency of the algorithm.

Description

一种云计算中矩阵行列式的安全外包计算加密方法A secure outsourcing calculation encryption method of matrix determinant in cloud computing

技术领域technical field

本发明涉及云计算安全领域,尤其涉及一种云计算中矩阵行列式的安全外 包计算加密方法。The invention relates to the field of cloud computing security, in particular to a secure outsourcing calculation encryption method of a matrix determinant in cloud computing.

背景技术Background technique

矩阵计算作为一种基础的计算问题,在大型工程计算、天体物理研究、经济 走势研判、气象环境预测、图形图像处理等领域有着十分广泛的应用。从某种 程度上来说,矩阵运算特别是大型矩阵的运算能力直接影响着国家工业基础建 设和国防事业的发展。然而对于大型矩阵而言,其运算又是一个十分耗时的任 务,往往需要付出极其昂贵的代价。As a basic calculation problem, matrix calculation has a wide range of applications in large-scale engineering calculations, astrophysics research, economic trend analysis, meteorological environment prediction, graphics and image processing and other fields. To some extent, matrix operations, especially large-scale matrix operations, directly affect the development of national industrial infrastructure and national defense. However, for large matrices, its operation is a very time-consuming task, often requiring an extremely expensive price.

云计算的出现则为这一切带来了福音,云计算作为一种商业化的服务模式, 其服务的实质就是将自己充足的设备资源进行外包,客户通过委托计算的方式 将本地无法解决的耗时任务委托给拥有能力的云服务提供商,云服务提供商代 替用户执行相关任务,并按照使用次数或者占用资源的大小收取一定的费用。The emergence of cloud computing has brought good news to all of these. As a commercial service model, cloud computing essentially outsources its own sufficient equipment resources. Customers use entrusted computing to reduce consumption that cannot be solved locally. Time tasks are entrusted to cloud service providers with capabilities, and cloud service providers perform related tasks on behalf of users, and charge a certain fee according to the number of times of use or the size of occupied resources.

但是云计算在给用户带来诸多方便的同时也存在着巨大的安全隐患。随着越 来越多的敏感数据通过外包的方式上传至商业云平台,云端在接收用户数据的 同时也剥夺了用户对数据的直接控制,从而就产生了隐私数据的安全性问题。 而矩阵的安全外包计算正是在这种背景下应用而生,它解决了用户隐私数据及 其计算结果容易泄露或被恶意攻击的问题,同时避免了冗杂的加密过程对运算 效率的影响,实现了加密方案的安全性和高效性。But while cloud computing brings many conveniences to users, it also has huge security risks. As more and more sensitive data is uploaded to the commercial cloud platform through outsourcing, the cloud also deprives users of direct control over the data while receiving user data, thus creating security issues for private data. The security outsourcing calculation of the matrix is applied in this context. It solves the problem that the user's private data and calculation results are easily leaked or maliciously attacked, and at the same time avoids the impact of the complicated encryption process on the calculation efficiency. The security and efficiency of the encryption scheme are improved.

目前广泛存在的云计算中矩阵行列式安全外包计算加密方法主要有两种: (1)根据矩阵行列式的恒等性质,将矩阵中的一行(列)分解成n个元素之和 的形式,矩阵中其它元素保持不变,对n个矩阵行列式分别进行外包加密计算。 该方案主要存在两个问题,一方面云端服务器需要计算n个矩阵行列式增加了 计算成本,另一方面用户无法实现对云端服务器返回计算结果的正确性进行验 证。(2)利用加密方法对同一个矩阵分别进行两次加密,然后将加密矩阵发送 至云端服务器分别进行计算,比较云端服务器两次返回结果的一致性,如果两 次返回结果相等,则认为云端服务器计算结果可信,否则拒绝云端服务器计算 结果。该方案虽然在一定程度上降低的云端服务器的计算代价,但是如果云端 服务器将两次返回结果同乘一个相同的系数,错误的计算结果依然可以通过用 户验证,被用户作为正确的结果接受。本文提出的计算方法,采用云端服务器 计算结果与用户加密矩阵中相关元素进行一致性对比的方法,对云端服务器返 回结果的正确性进行验证,保证了计算结果的正确性和云端服务器的高效性。Currently, there are mainly two encryption methods for matrix determinant secure outsourcing calculation in cloud computing: (1) According to the identity property of matrix determinant, a row (column) in the matrix is decomposed into the form of the sum of n elements, The other elements in the matrix remain unchanged, and outsourced encryption calculations are performed on the n matrix determinants respectively. There are two main problems in this solution. On the one hand, the cloud server needs to calculate n matrix determinants, which increases the calculation cost. On the other hand, the user cannot verify the correctness of the calculation results returned by the cloud server. (2) Use the encryption method to encrypt the same matrix twice, and then send the encrypted matrix to the cloud server for calculation respectively, and compare the consistency of the results returned by the cloud server twice. If the results returned by the two times are equal, it is considered that the cloud server The calculation result is credible, otherwise the cloud server will reject the calculation result. Although this solution reduces the calculation cost of the cloud server to a certain extent, if the cloud server multiplies the two returned results by the same coefficient, the wrong calculation result can still be verified by the user and accepted by the user as the correct result. The calculation method proposed in this paper uses the consistency comparison between the calculation results of the cloud server and the relevant elements in the user encryption matrix to verify the correctness of the results returned by the cloud server, which ensures the correctness of the calculation results and the efficiency of the cloud server.

发明内容Contents of the invention

本发明的目的是提供一种云计算中矩阵行列式的安全外包计算加密方法, 保证了矩阵中每一个数据元素的安全性以及运算结果的可验证性,同时极大的 提高了算法的效率。The purpose of the present invention is to provide a secure outsourcing calculation encryption method of matrix determinant in cloud computing, which ensures the security of each data element in the matrix and the verifiability of calculation results, and greatly improves the efficiency of the algorithm.

本发明采用下述技术方案:The present invention adopts following technical scheme:

一种云计算中矩阵行列式的安全外包计算加密方法,依次包括以下步骤:A secure outsourcing calculation encryption method of a matrix determinant in cloud computing, comprising the following steps in sequence:

A:本地客户端读取用户输入的数据并组成矩阵A:其中,矩阵A为n阶方阵,n为正整数;A: The local client reads the data entered by the user and forms a matrix A: Among them, matrix A is a square matrix of order n, and n is a positive integer;

B:本地客户端对矩阵A进行预处理,生成加密矩阵A1″:B: The local client preprocesses matrix A to generate encrypted matrix A 1 ″:

B1,由密钥模块生成一组随机密钥k,α,β,P,Q,M,N和{π123}, 其中,k为任意非零随机数,α为非零随机向量,α=[α1 α2 … αn]1×n,β为零 向量,P和Q均为含有n+1个元素的随机数集合,P={p1,p2,…,pn+1}, Q={q1,q2,…,qn+1},M和N是两个n+1阶随机的单位置换矩阵,并且每行和每列均 只有一个非零元素1;{π123}为n+1元的随机置换函数, 其中,x1,x2,x3,…xn+1∈{1,2,…,n+1},且 x1,x2,x3,…xn+1中的任意两个数均不相等;y1,y2,y3,…yn+1∈{1,2,…,n+1},且 y1,y2,y3,…yn+1中的任意两个数均不相等;z1,z2,z3,…zn+1∈{1,2,…,n+1},且z1,z2,z3,…zn+1中的任意两个数均不相等;B1, a set of random keys k, α, β, P, Q, M, N and {π 1 , π 2 , π 3 } are generated by the key module, where k is any non-zero random number, α is a non-zero Zero random vector, α=[α 1 α 2 … α n ] 1×n , β is a zero vector, Both P and Q are sets of random numbers containing n+1 elements, P={p 1 ,p 2 ,…,p n+1 }, Q={q 1 ,q 2 ,…,q n+1 }, M and N are two n+1-order random single-position permutation matrices, and each row and column has only one non-zero element 1; {π 1 , π 2 , π 3 } are n+1-element random permutation functions, Among them, x 1 ,x 2 ,x 3 ,…x n+1 ∈{1,2,…,n+1}, and any two numbers in x 1 ,x 2 ,x 3 ,…x n+1 are not equal; y 1 ,y 2 ,y 3 ,…y n+1 ∈{1,2,…,n+1}, and any two of y 1 ,y 2 ,y3,…y n+1 The numbers are not equal; z 1 ,z 2 ,z 3 ,…z n+1 ∈{1,2,…,n+1}, and any of z 1 ,z 2 ,z 3 ,…z n+1 Neither number is equal;

B2,构造n+1阶新矩阵A1,根据步骤B1中生成的密钥k,α和β对用户输入 矩阵A进行加密处理,得到新的矩阵 B2. Construct a new matrix A 1 of order n+1, and encrypt the matrix A input by the user according to the key k, α and β generated in step B1 to obtain a new matrix

B3,对矩阵A1进行恒等变换,根据步骤B1中的随机置换函数{π123}以及 随机数集合P和Q,对矩阵A1进行如下变换得到矩阵A1′: 其中,i和j分别为1,2,3,…,n+1;若π1(i)=π2(i),则令pi=0;若π2(j)=π3(j),则令qj=0;B3, perform identity transformation on matrix A 1 , according to the random permutation function {π 1 , π 2 , π 3 } and random number sets P and Q in step B1, perform the following transformation on matrix A 1 to obtain matrix A 1 ′: Wherein, i and j are 1,2,3,...,n+1 respectively; if π 1 (i)=π 2 (i), then let p i =0; if π 2 (j)=π 3 (j ), then let q j =0;

B4,对矩阵A1′进行随机置换,根据密钥M和N对矩阵A1′进行随机置换得到A1″: A1″=MA1′N;B4. Perform random permutation on matrix A 1 ′, and perform random permutation on matrix A 1 ′ according to key M and N to obtain A 1 ″: A 1 ″=MA 1 ′N;

B5,本地客户端将加密矩阵A1″发送至云端服务器;B5, the local client sends the encryption matrix A 1 ″ to the cloud server;

C:云端服务器对加密矩阵A1″进行计算:C: The cloud server calculates the encryption matrix A 1 ″:

云端服务器执行LU分解算法,将加密矩阵A1″分解成一个下三角矩阵L和一 个上三角矩阵U,再将计算结果L和U返回至本地客户端;The cloud server executes the LU decomposition algorithm, decomposes the encryption matrix A 1 " into a lower triangular matrix L and an upper triangular matrix U, and then returns the calculation results L and U to the local client;

D:本地客户端接收到云端服务器返回的计算结果L和U并对返回的计算结 果L和U依次进行验证和解密处理:D: The local client receives the calculation results L and U returned by the cloud server and performs verification and decryption on the returned calculation results L and U in turn:

D1,本地客户端的验证:本地客户端的验证模块验证加密矩阵A1″中第i行主 对角线上的值a″i,i是否与下三角矩阵L第i行前i个元素与上三角矩阵U第i列前i 个元素的乘积之和相等;若则执行步骤D2,否则拒绝 接收云端服务器返回的结果;D1, verification of the local client: the verification module of the local client verifies whether the value a″ on the main diagonal of the i-th row in the encrypted matrix A 1i, i is the same as that of the i element before the i-th row of the lower triangular matrix L and the upper triangular The sum of the products of the first i elements in the i column of matrix U is equal; if Then execute step D2, otherwise refuse to receive the result returned by the cloud server;

D2,本地客户端使用解密模块对返回的计算结果L和U进行解密处理,还 原出输入矩阵A的行列式的值:D2. The local client uses the decryption module to decrypt the returned calculation results L and U, and restores the value of the determinant of the input matrix A:

本发明利用矩阵行列式的恒等变换以及分块矩阵的相关性质,提出了一种 全新的矩阵行列式外包计算的加密方法;与现有的加密方法相比,本发明保证 了矩阵中每一个数据元素的安全性以及运算结果的可验证性;本发明由密钥模 块、加密模块、计算模块、验证模块和解密模块构成,其中密钥模块、加密模 块、验证模块和解密模块设置在用户本地客户端,计算模块设置在云端服务器 上,将复杂计算在云端服务器上进行,降低了算法的时间复杂度,极大的提高 了算法的效率。The present invention utilizes the identity transformation of the matrix determinant and the related properties of the block matrix to propose a brand-new encryption method for outsourcing calculation of the matrix determinant; compared with the existing encryption method, the present invention ensures that each The security of data elements and the verifiability of operation results; the present invention is composed of a key module, an encryption module, a calculation module, a verification module and a decryption module, wherein the key module, encryption module, verification module and decryption module are set locally on the user The client and the calculation module are set on the cloud server, and complex calculations are performed on the cloud server, which reduces the time complexity of the algorithm and greatly improves the efficiency of the algorithm.

附图说明Description of drawings

图1为本发明的流程示意图。Fig. 1 is a schematic flow chart of the present invention.

具体实施方式Detailed ways

以下结合附图和实施例对本发明作以详细的描述:Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

如图1所示,本发明所述的一种云计算中矩阵行列式的安全外包计算加密 方法,包括密钥模块、加密模块、计算模块、验证模块和解密模块,其中密钥 模块、加密模块、验证模块和解密模块设置在用户的本地客户端上,计算模块 设置在云端服务器上,依次包括以下步骤:As shown in Fig. 1, a kind of matrix determinant safe outsourcing computing encryption method in cloud computing according to the present invention comprises key module, encryption module, calculation module, verification module and decryption module, wherein key module, encryption module The verification module and the decryption module are set on the user's local client, and the calculation module is set on the cloud server, which includes the following steps in turn:

A:本地客户端读取用户输入的数据并组成矩阵A:A: The local client reads the data entered by the user and forms a matrix A:

矩阵A为n阶方阵;其中,n为正整数; Matrix A is a square matrix of order n; where n is a positive integer;

B:本地客户端对矩阵A进行预处理,生成加密矩阵A1″:B: The local client preprocesses matrix A to generate encrypted matrix A 1 ″:

步骤B包括以下具体步骤:Step B includes the following specific steps:

B1:由密钥模块生成一组随机密钥,k,α,β,P,Q,M,N和{π123}, 其中,k为任意非零随机数,α为非零随机向量,α=[α1 α2…αn]1×n,β为零 向量,P和Q均为含有n+1个元素的随机数集合,P={p1,p2,…,pn+1}, Q={q1,q2,…,qn+1},M和N是两个n+1阶随机的单位置换矩阵,并且每行和每列均 只有一个非零元素1;{π123}为n+1元的随机置换函数, 其中,x1,x2,x3,…xn+1∈{1,2,…n+1},且 x1,x2,x3,…xn+1中的任意两个数的值均不相等;y1,y2,y3,…yn+1∈{1,2,…n+1},且 y1,y2,y3,…yn+1中的任意两个数的值均不相等;z1,z2,z3,…zn+1∈{1,2,…n+1},且 z1,z2,z3,…zn+1中的任意两个数的值均不相等。B1: A set of random keys are generated by the key module, k, α, β, P, Q, M, N and {π 123 }, where k is any non-zero random number, and α is Non-zero random vector, α=[α 1 α 2 …α n ] 1×n , β is a zero vector, Both P and Q are sets of random numbers containing n+1 elements, P={p 1 ,p 2 ,…,p n+1 }, Q={q 1 ,q 2 ,…,q n+1 }, M and N are two n+1-order random single-position permutation matrices, and each row and column has only one non-zero element 1; {π 1 , π 2 , π 3 } are n+1-element random permutation functions, Among them, x 1 ,x 2 ,x 3 ,…x n+1 ∈{1,2,…n+1}, and any two numbers in x 1 ,x 2 ,x 3 ,…x n+1 The values are not equal; y 1 ,y 2 ,y 3 ,…y n+1 ∈{1,2,…n+1}, and any two of y 1 ,y 2 ,y 3 ,…y n+1 The values of the numbers are not equal; z 1 ,z 2 ,z 3 ,…z n+1 ∈{1,2,…n+1}, and z 1 ,z 2 ,z 3 ,…z n+1 The values of any two numbers are not equal.

B2:构造n+1阶新矩阵A1:根据步骤B1中生成的密钥k,α和β对矩阵A进 行加密处理,得到新的矩阵 B2: Construct a new matrix A of order n+1. 1 : Encrypt matrix A according to the key k, α and β generated in step B1 to obtain a new matrix

B3:对矩阵A1进行恒等变换:根据步骤B1中的随机置换函数{π123}以及 随机数集合P和Q,对矩阵A1进行如下变换得到矩阵A1′: 其中,i和j分别为1,2,3,…,n+1;若π1(i)=π2(i),则令pi=0;若π2(j)=π3(j),则令qj=0;B3: Perform identity transformation on matrix A 1 : according to the random permutation function {π 1 , π 2 , π 3 } and random number sets P and Q in step B1, perform the following transformation on matrix A 1 to obtain matrix A 1 ′: Wherein, i and j are 1,2,3,...,n+1 respectively; if π 1 (i)=π 2 (i), then let p i =0; if π 2 (j)=π 3 (j ), then let q j =0;

B4:对矩阵A1′进行随机置换,根据密钥M和N对矩阵A1′进行随机置换得到A1″: A1″=MA1′N;B4: Perform random permutation on matrix A 1 ′, and perform random permutation on matrix A 1 ′ according to key M and N to obtain A 1 ″: A 1 ″=MA 1 ′N;

B5:本地客户端将加密矩阵A1″发送至云端服务器;B5: The local client sends the encryption matrix A 1 ″ to the cloud server;

C:云端服务器对加密矩阵A1″进行计算:C: The cloud server calculates the encryption matrix A 1 ″:

步骤C包含以下具体步骤:Step C includes the following specific steps:

C1:云端服务器执行LU分解算法,将加密矩阵A1″分解成一个下三角矩阵L 和一个上三角矩阵U;C1: The cloud server executes the LU decomposition algorithm to decompose the encryption matrix A 1 ″ into a lower triangular matrix L and an upper triangular matrix U;

C2:云端服务器将计算结果L和U返回至本地客户端;C2: The cloud server returns the calculation results L and U to the local client;

D:本地客户端接收云端服务器返回的计算结果L和U并对返回的计算结果 L和U依次进行验证和解密处理:D: The local client receives the calculation results L and U returned by the cloud server and performs verification and decryption on the returned calculation results L and U in turn:

D1:本地客户端对计算结果L和U进行验证:本地客户端的验证模块判断 加密矩阵A1″中第i行主对角线上的值a″i,i,是否与下三角矩阵L第i行前i个元素与 上三角矩阵U第i列前i个元素的乘积之和相等;若 则执行步骤D2,其中li,j为下三角矩阵L的第i行j列对 应的元素,ui,j为上三角矩阵U的第i行j列对应的元素,否则本地客户端拒绝接 收云端服务器返回的计算结果L和U,然后返回步骤C1对加密矩阵A1″进行重新 分解;D1: The local client verifies the calculation results L and U: the verification module of the local client judges whether the value a″ i,i on the main diagonal of the i-th row in the encryption matrix A 1 ″ is consistent with the i-th value of the lower triangular matrix L The sum of the product of the first i elements of the row and the first i elements of the i column of the upper triangular matrix U equal; if Then execute step D2, where l i,j is the element corresponding to row i and column j of the lower triangular matrix L, u i,j is the element corresponding to row i and column j of the upper triangular matrix U, otherwise the local client refuses to receive The calculation results L and U returned by the cloud server, and then return to step C1 to re-decompose the encryption matrix A 1 ";

D2:本地客户端使用解密模块对返回的计算结果L和U进行解密处理,还 原出输入矩阵A的行列式的值:D2: The local client uses the decryption module to decrypt the returned calculation results L and U, and restores the value of the determinant of the input matrix A:

即,which is,

Claims (1)

1. the safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing, which is characterized in that include following step successively Suddenly:
A:Local client reads data input by user and composition matrix A:Wherein, square Battle array A is n rank square formations, and n is positive integer;
B:Local client pre-processes matrix A, generates scrambled matrix A "1
B1 generates one group of random key k, α, β, P, Q, M, N and { π by cipher key module123, wherein k be arbitrary non-zero with Machine number, α are non-zero random vector, α=[α1 α2 … αn]1×n, β is null vector,P and Q is containing n+1 member The set of random numbers of element, P={ p1,p2,…,pn+1, Q={ q1,q2,…,qn+1, M and N are that two random units of n+1 ranks are set Matrix is changed, and often only there are one nonzero elements 1 for row and each column;{π123Be n+1 members random permutation function, Wherein, x1,x2, x3,…xn+1∈ 1,2 ... n+1 } and x1,x2,x3,…xn+1In any two number it is unequal;y1,y2,y3,…yn+1∈{1, 2 ... n+1 } and y1,y2,y3,…yn+1In any two number it is unequal;z1,z2,z3,…zn+1∈ 1,2 ... n+1 } and z1, z2,z3,…zn+1In any two number it is unequal;
B2 constructs the new matrix A of n+1 ranks1, place is encrypted to user's input matrix A according to the key k, α and β that are generated in step B1 Reason, obtains new matrix
B3, to matrix A1Identical transformation is carried out, according to the random permutation function { π in step B1123And set of random numbers P And Q, to matrix A1Carry out such as down conversion obtain matrix A '1 Wherein, i and j is respectively 1,2,3 ..., n+1;If π1(i)=π2(i), then p is enabledi=0;If π2(j)=π3(j), then q is enabledj=0;
B4, to matrix A '1Carry out random permutation, according to key M and N to matrix A '1It carries out random permutation and obtains A "1:A″1=MA '1N;
B5, local client is by scrambled matrix A "1It is sent to cloud server;
C:Cloud server is to scrambled matrix A "1It is calculated:
Cloud server executes LU decomposition algorithms, by scrambled matrix A "1Resolve into a lower triangular matrix L and upper three angular moment Battle array U, then result of calculation L and U are back to local client;
D:Local client receive cloud server return result of calculation L and U and to the result of calculation L and U of return successively Carry out verification and decryption processing:
D1, the verification of local client:The authentication module verification scrambled matrix A " of local client1In on the i-th row leading diagonal Value a "i,iThe sum of products phase of i element before whether being arranged with upper triangular matrix U i-th with i element before the i-th rows of lower triangular matrix L Deng;IfStep D2 is executed, the result that cloud server returns otherwise is rejected;
D2, local client are decrypted the result of calculation L and U of return using deciphering module, restore input matrix A Determinant value:
CN201810297907.7A 2018-03-30 2018-03-30 The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing Withdrawn CN108768622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810297907.7A CN108768622A (en) 2018-03-30 2018-03-30 The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810297907.7A CN108768622A (en) 2018-03-30 2018-03-30 The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing

Publications (1)

Publication Number Publication Date
CN108768622A true CN108768622A (en) 2018-11-06

Family

ID=63981335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810297907.7A Withdrawn CN108768622A (en) 2018-03-30 2018-03-30 The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing

Country Status (1)

Country Link
CN (1) CN108768622A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460536A (en) * 2018-11-16 2019-03-12 青岛大学 The safely outsourced algorithm of extensive matrix operation
CN109684603A (en) * 2019-01-09 2019-04-26 四川大学 A kind of Efficient Solution large scale matrix determinant can verify that outsourcing calculation method, client and cloud computing system
CN110247913A (en) * 2019-06-18 2019-09-17 电子科技大学 A kind of security matrix multiplication outsourcing method of support matrix neutral element secret protection
CN110324135A (en) * 2019-07-04 2019-10-11 浙江理工大学 A kind of safely outsourced method of homomorphic cryptography matrix determinant based on cloud computing
WO2020097943A1 (en) * 2018-11-16 2020-05-22 Nokia Technologies Oy Outsourced data processing
CN112995189A (en) * 2021-03-08 2021-06-18 北京理工大学 Method for publicly verifying matrix multiplication correctness based on privacy protection
CN113326477A (en) * 2021-07-30 2021-08-31 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN114239027A (en) * 2021-12-15 2022-03-25 中国电信股份有限公司 Data encryption method and apparatus, decryption method and apparatus, electronic equipment and medium
CN114429183A (en) * 2022-01-20 2022-05-03 三未信安科技股份有限公司 Method for safely solving approximate minimum normalized cut of graph
CN114817970A (en) * 2022-06-30 2022-07-29 深圳市洞见智慧科技有限公司 Data analysis method and system based on data source protection and related equipment
CN115248927A (en) * 2021-12-17 2022-10-28 青岛大学 Data processing method, device and system
CN116401650A (en) * 2023-04-14 2023-07-07 苏州慧睿康智能科技有限公司 Determinant-based API finite state security calling method
CN117874825A (en) * 2024-03-11 2024-04-12 建投物联股份有限公司 LU decomposition-based user privacy protection method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150215123A1 (en) * 2012-07-26 2015-07-30 Cisco Technology, Inc. Method and system for homomorphicly randomizing an input
CN105376057A (en) * 2015-11-13 2016-03-02 电子科技大学 Method for solving large-scale linear equation set through cloud outsourcing
CN106611128A (en) * 2016-07-19 2017-05-03 四川用联信息技术有限公司 Secondary encryption-based data validation and data recovery algorithm in cloud storage
CN106788980A (en) * 2017-01-16 2017-05-31 中国人民解放军国防科学技术大学 Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing
CN106775576A (en) * 2017-03-28 2017-05-31 青岛大学 The safely outsourced computational methods and system of the matrix multiplication that can verify that

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150215123A1 (en) * 2012-07-26 2015-07-30 Cisco Technology, Inc. Method and system for homomorphicly randomizing an input
CN105376057A (en) * 2015-11-13 2016-03-02 电子科技大学 Method for solving large-scale linear equation set through cloud outsourcing
CN106611128A (en) * 2016-07-19 2017-05-03 四川用联信息技术有限公司 Secondary encryption-based data validation and data recovery algorithm in cloud storage
CN106788980A (en) * 2017-01-16 2017-05-31 中国人民解放军国防科学技术大学 Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing
CN106775576A (en) * 2017-03-28 2017-05-31 青岛大学 The safely outsourced computational methods and system of the matrix multiplication that can verify that

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘祥: "云计算环境下可验证矩阵安全外", 《北京工业大学》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460536A (en) * 2018-11-16 2019-03-12 青岛大学 The safely outsourced algorithm of extensive matrix operation
WO2020097943A1 (en) * 2018-11-16 2020-05-22 Nokia Technologies Oy Outsourced data processing
CN109460536B (en) * 2018-11-16 2023-06-02 青岛大学 A Safe Outsourcing Method of Matrix Operation
CN113039744A (en) * 2018-11-16 2021-06-25 诺基亚技术有限公司 Outsourcing data processing
CN109684603A (en) * 2019-01-09 2019-04-26 四川大学 A kind of Efficient Solution large scale matrix determinant can verify that outsourcing calculation method, client and cloud computing system
CN110247913A (en) * 2019-06-18 2019-09-17 电子科技大学 A kind of security matrix multiplication outsourcing method of support matrix neutral element secret protection
CN110324135A (en) * 2019-07-04 2019-10-11 浙江理工大学 A kind of safely outsourced method of homomorphic cryptography matrix determinant based on cloud computing
CN110324135B (en) * 2019-07-04 2022-05-31 浙江理工大学 A cloud computing-based homomorphic encryption matrix determinant security outsourcing method
CN112995189B (en) * 2021-03-08 2022-01-21 北京理工大学 Method for publicly verifying matrix multiplication correctness based on privacy protection
CN112995189A (en) * 2021-03-08 2021-06-18 北京理工大学 Method for publicly verifying matrix multiplication correctness based on privacy protection
CN113326477A (en) * 2021-07-30 2021-08-31 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN114239027A (en) * 2021-12-15 2022-03-25 中国电信股份有限公司 Data encryption method and apparatus, decryption method and apparatus, electronic equipment and medium
CN115248927A (en) * 2021-12-17 2022-10-28 青岛大学 Data processing method, device and system
CN114429183A (en) * 2022-01-20 2022-05-03 三未信安科技股份有限公司 Method for safely solving approximate minimum normalized cut of graph
CN114817970A (en) * 2022-06-30 2022-07-29 深圳市洞见智慧科技有限公司 Data analysis method and system based on data source protection and related equipment
CN116401650A (en) * 2023-04-14 2023-07-07 苏州慧睿康智能科技有限公司 Determinant-based API finite state security calling method
CN116401650B (en) * 2023-04-14 2023-11-14 苏州慧睿康智能科技有限公司 A determinant-based API finite state safe calling method
CN117874825A (en) * 2024-03-11 2024-04-12 建投物联股份有限公司 LU decomposition-based user privacy protection method, device, equipment and medium
CN117874825B (en) * 2024-03-11 2024-05-28 建投物联股份有限公司 LU decomposition-based user privacy protection method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN108768622A (en) The safely outsourced calculating encryption method of matrix determinant in a kind of cloud computing
Qayyum et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution
Gong et al. Quantum image encryption algorithm based on quantum image XOR operations
Cheng et al. Secure $ k $ k-NN query on encrypted cloud data with multiple keys
CN108418784B (en) Distributed cross-domain authorization and access control method based on attribute password
Solak et al. Cryptanalysis of a multi-chaotic systems based image cryptosystem
CN106023051B (en) DNA image encryption method and system based on cloud model and hyperchaotic system
CN106788980B (en) Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
Liao et al. Efficient secure outsourcing of large-scale convex separable programming for big data
CN113434878A (en) Modeling and application method, device, equipment and storage medium based on federal learning
CN109460536A (en) The safely outsourced algorithm of extensive matrix operation
CN103684742A (en) Circulant matrix transformation based and ciphertext computation supportive encryption method
CN109934001A (en) A data encryption method based on normal cloud model
Fan et al. Ppca: Privacy-preserving principal component analysis using secure multiparty computation (mpc)
CN117527223A (en) Distributed decryption method and system for quantum-password-resistant grid
Wu et al. Contrast optimization for size invariant visual cryptography scheme
CN104052750B (en) A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation
Suganya et al. Security and privacy-efficient encryption algorithm for cloud data using genetic prime crossover technique
CN107590843A (en) The image encryption method of two-dimentional reversible cellular automata based on construction
Niu et al. A dual image encryption method based on improved henon mapping and improved logistic mapping
Ye et al. Measurement-based quantum sealed-bid auction
CN106683030B (en) Quantum multi-image encryption algorithm based on quantum multi-image model and three-dimensional transformation
Yu et al. A compressible image encryption method based on nondegenerate hyperchaotic system and its implementation on ZYNQ
Hendy et al. Post-quantum hybrid encryption scheme for blockchain application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181106