研究目的
Design secure, correct, and efficient protocols for outsourcing the ED and SVD of a matrix to a malicious cloud.
研究成果
The paper concludes that the proposed protocols for outsourcing eigen-decomposition and singular value decomposition of large-scale matrix to a malicious cloud fulfill the goals of security, cheating resilience, and high efficiency. It also introduces outsourcing principle component analysis as an application of the proposed protocols.
研究不足
The paper mentions the problem of 'zero item leakage' as a limitation of the permutation-based data-masking method used to hide the original matrix.
1:Experimental Design and Method Selection:
The paper employs efficient privacy-preserving transformations to protect both the input and output privacy and an efficient verification algorithm to check the correctness of the result returned from the cloud.
2:Sample Selection and Data Sources:
The paper does not specify sample selection or data sources.
3:List of Experimental Equipment and Materials:
The paper does not list specific experimental equipment or materials.
4:Experimental Procedures and Operational Workflow:
The paper describes the process of outsourcing ED and SVD tasks to a cloud, including key generation, encryption, verification, and decryption.
5:Data Analysis Methods:
The paper uses computational complexity analysis to evaluate the efficiency of the proposed protocols.
独家科研数据包,助您复现前沿成果,加速创新突破
获取完整内容