Homomorphic Matrix Operations Under Bicyclic Encoding

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2024-11-04 DOI:10.1109/TIFS.2024.3490862
Jingwei Chen;Linhan Yang;Wenyuan Wu;Yang Liu;Yong Feng
{"title":"Homomorphic Matrix Operations Under Bicyclic Encoding","authors":"Jingwei Chen;Linhan Yang;Wenyuan Wu;Yang Liu;Yong Feng","doi":"10.1109/TIFS.2024.3490862","DOIUrl":null,"url":null,"abstract":"Homomorphically encrypted matrix operations are extensively used in various privacy-preserving applications. Consequently, reducing the cost of encrypted matrix operations is a crucial topic on which numerous studies have been conducted. In this paper, we introduce a novel matrix encoding method, named bicyclic encoding, under which we propose two new algorithms <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {I}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {II}$ </tex-math></inline-formula> for encrypted matrix multiplication. <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {II}$ </tex-math></inline-formula> outperforms the stat-of-the-art algorithms in theory, while <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {I}$ </tex-math></inline-formula>, combined with the segmented strategy, performs well in practice, particularly for matrices with high dimensions. Another noteworthy advantage of bicyclic encoding is that it allows for transposing an encrypted matrix entirely free. A comprehensive experimental study based on our proof-of-concept implementation shows that each algorithm introduced in this paper has specific scenarios outperforming existing algorithms, achieving speedups ranging from 2x to 38x.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"1390-1404"},"PeriodicalIF":8.0000,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10741550/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

Homomorphically encrypted matrix operations are extensively used in various privacy-preserving applications. Consequently, reducing the cost of encrypted matrix operations is a crucial topic on which numerous studies have been conducted. In this paper, we introduce a novel matrix encoding method, named bicyclic encoding, under which we propose two new algorithms $\textsf {BMM}\text {-}\textsf {I}$ and $\textsf {BMM}\text {-}\textsf {II}$ for encrypted matrix multiplication. $\textsf {BMM}\text {-}\textsf {II}$ outperforms the stat-of-the-art algorithms in theory, while $\textsf {BMM}\text {-}\textsf {I}$ , combined with the segmented strategy, performs well in practice, particularly for matrices with high dimensions. Another noteworthy advantage of bicyclic encoding is that it allows for transposing an encrypted matrix entirely free. A comprehensive experimental study based on our proof-of-concept implementation shows that each algorithm introduced in this paper has specific scenarios outperforming existing algorithms, achieving speedups ranging from 2x to 38x.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
双环编码下的同态矩阵运算
同态加密矩阵运算广泛应用于各种隐私保护应用中。因此,降低加密矩阵运算的成本是一个重要的主题,已经进行了大量的研究。本文介绍了一种新的矩阵编码方法——双环编码,并在此基础上提出了两种新的加密矩阵乘法算法$\textsf {BMM}\text {-}\textsf {I}$和$\textsf {BMM}\text {-}\textsf {II}$。$\textsf {BMM}\text {-}\textsf {II}$在理论上优于最先进的算法,而$\textsf {BMM}\text {-}\textsf {I}$结合分段策略在实践中表现良好,特别是对于高维矩阵。双环编码的另一个值得注意的优点是,它允许完全自由地对加密矩阵进行转置。基于我们的概念验证实现的综合实验研究表明,本文中引入的每种算法都具有优于现有算法的特定场景,实现了从2倍到38倍的速度提升。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
CShard: Blockchain Sharding via Repairable Fountain Codes and the Paradigm for Sharding Design Frequency Hopping Waveform Design for Secure Integrated Sensing and Communications AtomXross: Towards General Cross-Chain Transaction Neural Architecture Search based Global-local Vision Mamba for Palm-Vein Recognition Differentially Private Zeroth-Order Methods for Scalable Large Language Model Fine-tuning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1