Computer and Modernization

Previous Articles     Next Articles

Verifiable and Secure Protocol for Outsourcing Matrix Determinant Computation to Malicious Cloud

  

  1. (College of Computer Science, Beijing University of Technology, Beijing 100124, China)
  • Received:2015-01-21 Online:2015-05-18 Published:2015-05-18

Abstract: Computation outsourcing to the cloud has become a popular application. This computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. A protocol is designed to enable secure, robust cheating resistant, and efficient outsourcing of matrix determinant computation to a malicious cloud. Client encrypts the original matrix and then transfers it to cloud server to compute. Analysis shows that the proposed protocol is correct, secure, and robust cheating resistant. Extensive theoretical analysis also shows its high-efficiency.

Key words: cloud computation, secure computation outsource, determinant computation

CLC Number: