By using our WEE scheme, we propose five secure outsourcing protocols of Gaussian elimination, Gaussian-Jordan elimination, matrix determinant, linear system solver, and matrix inversion. Each of these protocols preserves data privacy for clients (data owners). Furthermore, the linear system solver and matrix inversion protocols provide a cheating-resistant mechanism to verify correctness of computation results. Our experimental result shows that our protocols gain efficiency significantly for an outsourcer. Our outsourcing protocol solves a linear system of n = 1, 000 equations and m = 1, 000 unknown variables about 472 times faster than a non-outsourced version. The efficiency gain is more substantial when (n, m) gets larger. For example, when n = 10, 000 and m = 10, 000, the protocol can solve it about 56, 274 times faster. Our protocols can also be easily implemented in parallel computation architecture to get more efficiency improvement.
Category / Keywords: cryptographic protocols / secure outsourcing, data privacy, cloud computing, linear algebra, linear system Original Publication (with minor differences): Journal of Information Science and Engineering Date: received 28 Sep 2015 Contact author: jellystudio cs96g at gmail com Available format(s): PDF | BibTeX Citation Version: 20150928:195728 (All versions of this report) Short URL: ia.cr/2015/947 Discussion forum: Show discussion | Start new discussion