研究目的
Design secure, correct, and efficient protocols for outsourcing the ED and SVD of a matrix to a malicious cloud.
研究成果
We have designed two protocols for outsourcing eigen-decomposition and singular value decomposition of large-scale matrix to a malicious cloud. We have shown that both of the two outsourcing protocols fulfill the goals of security, cheating resilience and high efficiency. We also introduce outsourcing principle component analysis as an application of our proposed outsourcing protocols.
研究不足
The encryption method may suffer from the problem of 'zero item leakage', which means that the cloud may know the number of zeros in the original matrix by counting the number of zeros in the encrypted matrix.
1:Experimental Design and Method Selection:
Includes the overall experimental design rationale, the theoretical models or algorithms employed, and detailed procedures of the experimental methods.
2:Sample Selection and Data Sources:
Specifies the samples or datasets used in the experiment, including selection criteria and data acquisition methods.
3:List of Experimental Equipment and Materials:
Enumerates the required instruments, devices, and materials, along with their specifications and intended uses.
4:Experimental Procedures and Operational Workflow:
Provides a step-by-step description of the experimental process, covering equipment setup, data collection techniques, and control of variables during the experiment.
5:Data Analysis Methods:
Explains the approach for analyzing experimental data, including statistical techniques and software tools utilized.
独家科研数据包,助您复现前沿成果,加速创新突破
获取完整内容