×

Outsourcing computing of large matrix Jordan decomposition. (English) Zbl 1435.94147

Summary: The Jordan decomposition of matrix is a typical scientific and engineering computational task, but such computation involves enormous computing resources for large matrices, which is burdensome for the resource-limited clients. Cloud computing enables computational resource-limited clients to economically outsource such problems to the cloud server. However, outsourcing Jordan decomposition of large-scale matrix to the cloud brings great security concerns and challenges since the matrices usually contain sensitive information. In this paper, we present a secure, verifiable, efficient, and privacy preserving algorithm for outsourcing Jordan decomposition of large-scale matrix. Security analysis shows that our algorithm is practically secure. Efficient verification algorithm is used to verify the results returned from the cloud.

MSC:

94A62 Authentication, digital signatures and secret sharing
65F99 Numerical linear algebra
68P25 Data encryption (aspects in computer science)
15B33 Matrices over special rings (quaternions, finite fields, etc.)
Full Text: DOI

References:

[1] Liu, W., Research on the characteristics and key application fields of cloud computing, Intelligence, 30 (2014)
[2] Wang, C.; Ren, K.; Wang, J., Secure and practical outsourcing of linear programming in cloud computing, Proceedings of the 2011 Proceedings IEEE INFOCOM · doi:10.1109/infcom.2011.5935305
[3] Feng, D.-G.; Zhang, M.; Zhang, Y.; Xu, Z., Study on cloud computing security, Journal of Software, 22, 1, 71-83 (2011) · doi:10.3724/sp.j.1001.2011.03958
[4] Atallah, M. J.; Pantazopoulos, K. N.; Rice, J. R.; Spafford, E. H., Secure outsourcing of scientific computations, Advances in Computers, 54, 216-272 (2002) · doi:10.1016/s0065-2458(01)80019-x
[5] Benjamin, D.; Atallah, M. J., Private and cheating-free outsourcing of algebraic computation, Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, IEEE · doi:10.1109/pst.2008.12
[6] Gentry, C., Fully homomorphic encryption using ideal lattices, Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing—STOC ‘09 · Zbl 1304.94059 · doi:10.1145/1536414.1536440
[7] Yang, B.; Wu, D., The efficient and verifiable secure outsourcing calculation of matrix product, Journal of Cryptography, 4, 4, 322-332 (2017)
[8] Zhou, L.; Li, C., Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud, IEEE Access, 4, 869-879 (2017) · doi:10.1109/access.2016.2535103
[9] Zhao, Y., Discussion on the role of matrix Jordan canonical form in matrix analysis, Journal of Western Yunnan Normal University of Science and Technology, 1, 119-124 (2015)
[10] Chen, L.; Hou, R.; Wang, L., Jordan canonical forms of matrices over quaternion field, Applied Mathematics and Mechanics, 17, 6, 559-568 (1996) · Zbl 0881.15018 · doi:10.1007/bf00119754
[11] Huang, L., Jordan canonical form of a matrix over the quaternion field, Northeastern Mathematical Journal, 10, 1, 18-24 (1994) · Zbl 0805.15010
[12] Tongsong, J.; Li, C., Generalized diagonalization of matrices over quaternion field, Applied Mathematics and Mechanics, 20, 11, 1297-1304 (1999) · Zbl 0954.15012 · doi:10.1007/bf02463800
[13] Jiang, T.; Zhuang, W., A simple proof of Jordan canonical form for matrices over the quaternion field, (Chinese), Mathematica Applicata, 14, 204-207 (2001) · Zbl 0999.15014
[14] Guo, S., Research on Outsourcing Computing in Cloud Computing (2013), Beijing, China: University of the Chinese Academy of Sciences, Beijing, China
[15] Duncan, S., Verifiable computation of security outsourcing matrix and its application, Chinese Science: Information Science, 43, 7, 842-852 (2013)
[16] Motwani, R.; Raghavan, P., Randomized Algorithms (1995), Cambridge, UK: Cambridge University Press, Cambridge, UK · Zbl 0849.68039
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.