Skip to main content
Log in

EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the rapid development of cloud computing, clients and users with limited computing resources can outsource their computation-intensive tasks to the Cloud Service Providers (CSPs). However, as the CSPs are commercial in nature and aim to increase their profits, some security challenges are still attached to them. In this paper, we propose an efficient publicly verifiable computation scheme (EPVM) for large-scale matrix multiplication with privacy preservation. Based on the theory of discrete logarithm problem and the techniques of privacy-preserving matrix transformation, our scheme not only protects the privacy of the client’s matrices but also significantly reduces the computation overhead on the client end as well as the CSP side. Our detailed security analysis and proofs show that the proposed scheme can achieve the established security requirements. The experimental evaluation also demonstrates that the proposed scheme works efficiently as compared to other existing solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The data and material is available.

Code availability

The code is available.

References

  1. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Annual Cryptology Conference, pages 465–482. Springer, (2010)

  2. Zhang, C., Zhu, L., Xu, C., Liu, X., Sharif, K.: Reliable and privacy-preserving truth discovery for mobile crowdsensing systems. IEEE Trans. Dep. Secur. Comput. https://doi.org/10.1109/TDSC.2019.2919517

  3. Golub, G., Van Loan, C.: Matrix computations, 4th edn. johns hopkins, (2013)

  4. Fahim, M., Jeong, H., Haddadpour, F., Dutta, S., Cadambe, V., Grover, P.: On the optimal recovery threshold of coded matrix multiplication. In: 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 1264–1270. IEEE, (2017)

  5. Zhang, X., Jiang, T., Li, K.C., Castiglione, A., Chen, X.: New publicly verifiable computation for batch matrix multiplication. Information Ences, page S0020025517311246, (2017)

  6. Erfan, F., Mala, H.: Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode. Cluster Comput. 23, 2835–2845 (2020)

    Article  Google Scholar 

  7. Zhang, S., Li, H., Jia, K., Dai, Y-S., Zhao, L.: Efficient secure outsourcing computation of matrix multiplication in cloud computing. In: 2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016, pages 1–6, (2016)

  8. Zhang, S., Li, H., Dai, Y., Li, J., He, M., Rongxing, L.: Verifiable outsourcing computation for matrix multiplication with improved efficiency and applicability. IEEE Internet Things J. 5(6), 5076–5088 (2018)

    Article  Google Scholar 

  9. Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: International Conference on Theory of Cryptography, (2011)

  10. Liu, J., Bi, J., Li, M.: Secure outsourcing of large matrix determinant computation. Front. Comput. ence 14(6), 1–12 (2020)

    CAS  Google Scholar 

  11. Zhang, J., Yang, Y., Wang, Z.: Outsourcing large-scale systems of linear matrix equations in cloud computing. In: IEEE International Conference on Parallel & Distributed Systems, (2017)

  12. Zhang, S., Tian, C., Zhang, H., Jia, Y., Li, F..: Practical and secure outsourcing algorithms of matrix operations based on a novel matrix encryption method. IEEE Access 7, 53823–53838 (2019)

    Article  Google Scholar 

  13. Yamane, M., Iwamura, K.: Secure and efficient outsourcing of matrix multiplication based on secret sharing scheme using only one server. In: IEEE 17th Annual Consumer Communications & Networking Conference, CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020, pages 1–6, (2020)

  14. Fu, S., Yu, Y., Xu, M.: A secure algorithm for outsourcing matrix multiplication computation in the cloud. In: "Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017", pages 27–33, (2017)

  15. Xixun, Y., Yan, Z., Zhang, R.: Verifiable outsourced computation over encrypted data. Inf. Sci. 479, 372–385 (2018)

    Google Scholar 

  16. Dorsala, R.M., Sastry, V.N., Chapram, S.: Fair payments for verifiable cloud services using smart contracts. Comput. Secur. 90, 101712 (2020)

    Article  Google Scholar 

  17. Avizheh, S., Nabi, M., Safavi-Naini, R., Venkateswarlu K.M.: Verifiable computation using smart contracts. In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW’19, page 17-28, New York, NY, USA, (2019). Association for Computing Machinery

  18. Zhang, Y., Deng, R.H., Liu, X., Zheng, D.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  19. Dong, C., Wang, Y., Aldweesh, A., Mccorry, P., Van Moorsel, A.: Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. MISSING INFORMATION, (2017)

  20. Zhang, C., Zhu, L., Xu, C., Kashif, S., Kai, D., Liu, X., Du, X., Guizani, M.: Tppr: a trust-based and privacy-preserving platoon recommendation scheme in vanet. IEEE Trans. Serv. Comput. (2019). https://doi.org/10.1109/TSC.2019.2961992

    Article  Google Scholar 

  21. Xie, D., Yang, H., Qin, J., Ma, J.: Privacy-preserving and publicly verifiable protocol for outsourcing polynomials evaluation to a malicious cloud. Int. J. Digit. Crime Forensics 11(4), 14–27 (2019)

    Article  Google Scholar 

  22. Song, W., Wang, B., Wang, Q., Shi, C., Lou, W., Peng, Z.: Publicly verifiable computation of polynomials over outsourced data with multiple sources. IEEE Trans. Inf. Forensics Secur. 12, 2334–2347 (2017)

    Article  Google Scholar 

  23. Salinas, S., Luo, C., Chen, X., Pan, L.: Efficient secure outsourcing of large-scale linear systems of equations. In: 2015 IEEE Conference on Computer Communications (INFOCOM), (2015)

  24. Kumar, M., Mishra, V., Shukla, A., Singh, M., Vardhan, M.: A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication. J. Intell. Fuzzy Syst. 38(5), 6445–6455 (2020)

    Article  Google Scholar 

  25. Yu, W., Liao, Y., Liang, Y., Liu, Y.: Secure and efficient protocol for outsourcing large-scale matrix multiplication to the cloud. IEEE Access 8, 227556–227565 (2020)

    Article  Google Scholar 

  26. Liu, C., Hu, X., Chen, X., Wei, J., Liu, W.: An efficient matrix multiplication with enhanced privacy protection in cloud computing and its applications. CoRR, abs/2105.05525, (2021)

  27. Bagheri, R., Amini, M., Somayeh Dolatnezhad, S.: Efficient verification of parallel matrix multiplication in public cloud: the mapreduce case. J. Big Data 7(1), 86 (2020)

    Article  Google Scholar 

  28. Hu, C., Alhothaily, A., Alrawais, A., Cheng, X., Sturtivant, C., Liu, H.: A secure and verifiable outsourcing scheme for matrix inverse computation. In 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017, pages 1–9. IEEE, (2017)

  29. Ye, J., Zhang, H., Changyou, F.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)

    Google Scholar 

  30. Anmin, F., Li, S., Shui, Y., Zhang, Y., Sun, Y.: Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118, 102–112 (2018)

    Article  Google Scholar 

  31. Zhang, K., Wei, L., Li, X., Qian, H.: Scalable and soundness verifiable outsourcing computation in marine mobile computing. Wirel. Commun. Mob. Comput. (2017). https://doi.org/10.1155/2017/6128437

    Article  Google Scholar 

  32. Tian, C., Yu, J., Zhang, H., Xue, H., Wang, C., Ren, K.: Novel secure outsourcing of modular inversion for arbitrary and variable modulus. IEEE Trans. Serv. Comput. 15, 241–253 (2019)

    Article  Google Scholar 

  33. Zhang, L.F., Safavi-Naini, R.: Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. Des. Codes Cryptogr. 88(4), 677–709 (2020)

    Article  MathSciNet  Google Scholar 

Download references

Funding

This research is supported by the National Natural Science Foundation of China (Grant Nos. 62272042, 61972037).

Author information

Authors and Affiliations

Authors

Contributions

The authors in the list all contributed to the study conception and design. The main conception and design were proposed by Chang Xu, and completed with the help of Hongzhou Rao, Liehuang Zhu, and ChuanZhang. Chang Xu did the work of formal analysis. Hongzhou Rao wrote the first draft of the manuscript. And Kashif Sharif provided professional advice on reviewing and editing the manuscript. The experiments were designed by Chang Xu and Hongzhou Rao.

Corresponding author

Correspondence to Chang Xu.

Ethics declarations

Conflict of interest

Authors do not have any conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, C., Rao, H., Zhu, L. et al. EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04329-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04329-2

Keywords

Navigation