{"title":"Homomorphic Matrix Operations Under Bicyclic Encoding","authors":"Jingwei Chen;Linhan Yang;Wenyuan Wu;Yang Liu;Yong Feng","doi":"10.1109/TIFS.2024.3490862","DOIUrl":null,"url":null,"abstract":"Homomorphically encrypted matrix operations are extensively used in various privacy-preserving applications. Consequently, reducing the cost of encrypted matrix operations is a crucial topic on which numerous studies have been conducted. In this paper, we introduce a novel matrix encoding method, named bicyclic encoding, under which we propose two new algorithms <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {I}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {II}$ </tex-math></inline-formula> for encrypted matrix multiplication. <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {II}$ </tex-math></inline-formula> outperforms the stat-of-the-art algorithms in theory, while <inline-formula> <tex-math>$\\textsf {BMM}\\text {-}\\textsf {I}$ </tex-math></inline-formula>, combined with the segmented strategy, performs well in practice, particularly for matrices with high dimensions. Another noteworthy advantage of bicyclic encoding is that it allows for transposing an encrypted matrix entirely free. A comprehensive experimental study based on our proof-of-concept implementation shows that each algorithm introduced in this paper has specific scenarios outperforming existing algorithms, achieving speedups ranging from 2x to 38x.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"1390-1404"},"PeriodicalIF":8.0000,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10741550/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Homomorphically encrypted matrix operations are extensively used in various privacy-preserving applications. Consequently, reducing the cost of encrypted matrix operations is a crucial topic on which numerous studies have been conducted. In this paper, we introduce a novel matrix encoding method, named bicyclic encoding, under which we propose two new algorithms $\textsf {BMM}\text {-}\textsf {I}$ and $\textsf {BMM}\text {-}\textsf {II}$ for encrypted matrix multiplication. $\textsf {BMM}\text {-}\textsf {II}$ outperforms the stat-of-the-art algorithms in theory, while $\textsf {BMM}\text {-}\textsf {I}$ , combined with the segmented strategy, performs well in practice, particularly for matrices with high dimensions. Another noteworthy advantage of bicyclic encoding is that it allows for transposing an encrypted matrix entirely free. A comprehensive experimental study based on our proof-of-concept implementation shows that each algorithm introduced in this paper has specific scenarios outperforming existing algorithms, achieving speedups ranging from 2x to 38x.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features