期刊文献+

基于大规模矩阵Jordan分解的外包计算 被引量:1

Outsourcing computing of large matrix Jordan decomposition
下载PDF
导出
摘要 目前,外包计算已成为减轻用户庞大计算量的重要策略之一。针对大规模矩阵的Jordan分解需要用户付出大量的计算资源问题。文章设计了一个安全、结果可验证、高效的外包协议,达到了节省用户计算资源的目的。通过线性变换、元素的重排列对原始矩阵进行加密,保护了用户隐私信息,并运用高效的验证算法对云端返回的结果进行了高效验证。文章通过计算复杂度分析,验证了该协议的高效性。 At present,outsourcing computing has become an important way to reduce the large amount of computing by users.The Jordan decomposition of large-scale matrix requires users to pay a lot of computing resources.In order to save user's computing resources,the article designs a secure,verifiable and efficient outsourcing protocol for Jordan decomposition of large-scale matrix.The original matrix is encrypted by linear transformation and element rearrangement to protect the user's privacy information.Efficient verification algorithm is used to verify the results returned from the cloud.Finally,the computational complexity is analyzed and the efficiency of the protocol is verified.
作者 吴宏锋 闫晶晶 Wu Hongfeng;Yan Jingjing(College of Science,North China University of Technology,Beijing 100144)
出处 《网络空间安全》 2019年第2期89-95,共7页 Cyberspace Security
基金 国家自然科学基金(项目编号:61370187) 北京市教委科技计划项目(项目编号:KM201510009013)
关键词 外包计算 JORDAN分解 可验证性 outsourcing computing Jordan decomposition verifiability
  • 相关文献

参考文献6

二级参考文献56

  • 1袁俊伟.关于用几何方法求Jordan标准型的一点注记[J].湖北民族学院学报(自然科学版),1996,14(2):62-63. 被引量:4
  • 2张志旭,曹重光,张玲,朱海成.矩阵标准形的思想及应用[J].佳木斯大学学报(自然科学版),2006,24(4):592-593. 被引量:4
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1104

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部