{"title":"How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud","authors":"Chengliang Tian;Jia Yu;Panpan Meng;Guoyan Zhang;Weizhong Tian;Yan Zhang","doi":"10.1109/TCC.2024.3408240","DOIUrl":null,"url":null,"abstract":"Cloud-assisted computation empowers resource-constrained clients to efficiently tackle computationally intensive tasks by outsourcing them to resource-rich cloud servers. In the current era of Big Data, the widespread need to solve large-scale modular linear systems of equations (\n<inline-formula><tex-math>$\\mathcal {LMLSE}$</tex-math></inline-formula>\n) of the form \n<inline-formula><tex-math>$\\mathbf {A}\\mathbf {x}\\equiv \\mathbf {b}\\;{\\rm mod}\\;{q}$</tex-math></inline-formula>\n poses a significant challenge, particularly for lightweight devices. This paper delves into the secure outsourcing of \n<inline-formula><tex-math>$\\mathcal {LMLSE}$</tex-math></inline-formula>\n under a malicious single-server model and, to the best of our knowledge, introduces the inaugural protocol tailored to this specific context. The cornerstone of our protocol lies in the innovation of a novel matrix encryption method based on sparse unimodular matrix transformations. This novel technique bestows our protocol with several key advantages. First and foremost, it ensures robust privacy for all computation inputs, encompassing \n<inline-formula><tex-math>$\\mathbf {A},\\mathbf {b}, q$</tex-math></inline-formula>\n, and the output \n<inline-formula><tex-math>$\\mathbf {x}$</tex-math></inline-formula>\n, as validated by thorough theoretical analysis. Second, the protocol delivers optimal verifiability, enabling clients to detect cloud server misbehavior with an unparalleled probability of 1. Furthermore, it boasts high efficiency, requiring only a single interaction between the client and the cloud server, significantly reducing local-client time costs. For an \n<inline-formula><tex-math>$m$</tex-math></inline-formula>\n-by-\n<inline-formula><tex-math>$n$</tex-math></inline-formula>\n matrix \n<inline-formula><tex-math>$\\mathbf {A}$</tex-math></inline-formula>\n, a given parameter \n<inline-formula><tex-math>$\\lambda =\\omega (\\log q)$</tex-math></inline-formula>\n, and \n<inline-formula><tex-math>$\\rho =2.371552$</tex-math></inline-formula>\n, the time complexity is diminished from \n<inline-formula><tex-math>$O(\\max \\lbrace m n^{\\rho -1}, m^{\\rho -2} n^{2}\\rbrace \\cdot (\\log q)^{2})$</tex-math></inline-formula>\n to \n<inline-formula><tex-math>$O((mn+m^{2})\\lambda \\log q+mn(\\log q)^{2})$</tex-math></inline-formula>\n. The comprehensive results of our experimental performance evaluations substantiate the protocol's practical efficiency and effectiveness.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 3","pages":"913-927"},"PeriodicalIF":5.3000,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cloud Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10546289/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud-assisted computation empowers resource-constrained clients to efficiently tackle computationally intensive tasks by outsourcing them to resource-rich cloud servers. In the current era of Big Data, the widespread need to solve large-scale modular linear systems of equations (
$\mathcal {LMLSE}$
) of the form
$\mathbf {A}\mathbf {x}\equiv \mathbf {b}\;{\rm mod}\;{q}$
poses a significant challenge, particularly for lightweight devices. This paper delves into the secure outsourcing of
$\mathcal {LMLSE}$
under a malicious single-server model and, to the best of our knowledge, introduces the inaugural protocol tailored to this specific context. The cornerstone of our protocol lies in the innovation of a novel matrix encryption method based on sparse unimodular matrix transformations. This novel technique bestows our protocol with several key advantages. First and foremost, it ensures robust privacy for all computation inputs, encompassing
$\mathbf {A},\mathbf {b}, q$
, and the output
$\mathbf {x}$
, as validated by thorough theoretical analysis. Second, the protocol delivers optimal verifiability, enabling clients to detect cloud server misbehavior with an unparalleled probability of 1. Furthermore, it boasts high efficiency, requiring only a single interaction between the client and the cloud server, significantly reducing local-client time costs. For an
$m$
-by-
$n$
matrix
$\mathbf {A}$
, a given parameter
$\lambda =\omega (\log q)$
, and
$\rho =2.371552$
, the time complexity is diminished from
$O(\max \lbrace m n^{\rho -1}, m^{\rho -2} n^{2}\rbrace \cdot (\log q)^{2})$
to
$O((mn+m^{2})\lambda \log q+mn(\log q)^{2})$
. The comprehensive results of our experimental performance evaluations substantiate the protocol's practical efficiency and effectiveness.
期刊介绍:
The IEEE Transactions on Cloud Computing (TCC) is dedicated to the multidisciplinary field of cloud computing. It is committed to the publication of articles that present innovative research ideas, application results, and case studies in cloud computing, focusing on key technical issues related to theory, algorithms, systems, applications, and performance.