Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verifiable constrained quadratic programming safety outsourcing calculation method and system

A secondary planning and security outsourcing technology, which is applied in the fields of information security, privacy protection and cloud computing, can solve the problem of meaningless outsourcing, achieve the effect of improving robustness, solving resource constraints, and preventing collusion attacks

Inactive Publication Date: 2021-08-17
SHANGHAI UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, the purpose of outsourcing computing is to save computing resources, so efficient encryption, decryption, and verification algorithms are required. If the complexity of outsourcing computing is not much lower than that of local direct computing, then outsourcing will be meaningless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable constrained quadratic programming safety outsourcing calculation method and system
  • Verifiable constrained quadratic programming safety outsourcing calculation method and system
  • Verifiable constrained quadratic programming safety outsourcing calculation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] see figure 1 , a verifiable constrained quadratic programming secure outsourcing computing method, the client needs to hand over the complex task of quadratic programming to the cloud server for computing due to limited local resources. The steps of the entire outsourcing computing process are as follows:

[0040] In the first step, the client performs initialization settings, including generating three random elementary matrices and a random vector;

[0041] In the second step, the client uses the elementary matrix and random vector generated in the first step to construct a new encrypted quadratic programming problem and send it to the cloud server.

[0042] Step 3: After receiving the encrypted quadratic programming problem, the cloud server solves the problem according to the requirements, and returns the result to the client;

[0043] Step 4: After receiving the result, the client first verifies the result. If it passes the verification, it decrypts to get the ans...

Embodiment 2

[0046] This embodiment is basically the same as Embodiment 1, and the special features are as follows:

[0047] In this embodiment, the first step includes three sub-steps:

[0048] Step a, generating a displacement map;

[0049] Step b, generating elementary matrices for encryption;

[0050] Step c, generate a random vector.

[0051] In this embodiment, the described step a is specifically:

[0052] For a given set S = {1, 2, 3, ..., n}, the permutation mapping is expressed as the following form Among them, π(i), i=1, 2,..., n is a certain arrangement of 1, 2,...n; the client needs to generate three permutation maps π 1 (k), π 2 (m), π 3 (n); wherein, π(n) represents a random permutation map, and k, m, and n respectively represent the number of set elements corresponding to the three random permutation maps.

[0053] In this embodiment, the bth step is specifically:

[0054] First, the client generates n random numbers ω 1 , ω 2 ,...,ω n ; Then use the Kronecker f...

Embodiment 3

[0062] This embodiment is basically the same as the above-mentioned embodiment, and the special features are as follows:

[0063] In this embodiment, a verifiable constrained quadratic programming secure outsourcing computing system includes an initialization module for implementing the verifiable constrained quadratic programming secure outsourcing computing method in the above embodiment.

[0064] The verifiable constrained quadratic programming security outsourcing computing system in this embodiment includes the following parts:

[0065] Initialization module: the client generates elementary matrices and random vectors, and stores them in the initial matrix pool to solve the subsequent encrypted initial quadratic programming problem;

[0066] Blind module: the user randomly selects the elementary matrix P from the elementary matrix pool 1 ,P 2 ,P 3 and random vector r to encrypt the original quadratic programming problem to protect the client's private information;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verifiable constrained quadratic programming safe outsourcing calculation method and system.The client side can outsourcing calculation which cannot be conducted locally to a cloud server for calculation so as to reduce the calculation cost of a user, and the outsourcing process comprises the steps that firstly, the client side initializes setting, encrypts tasks needing outsourcing and sends the tasks needing outsourcing to the cloud server; then, the cloud server receives the task, performs calculation according to requirements, and returns a corresponding result to the client; and finally, the client verifies the correctness of the returned result, if the result is correct, the required original task result is obtained through decryption, otherwise, the result is refused to be accepted, and the cloud server is required to recalculate. According to the method provided by the invention, the client can solve the difficult problem which cannot be solved due to local resource limitation on the premise of protecting own data privacy. Meanwhile, the malicious behavior of the cloud server can be resisted.

Description

technical field [0001] The present invention relates to the fields of information security, privacy protection and cloud computing, and in particular to a secure outsourcing computing method and system for constrained quadratic programming. Background technique [0002] The quadratic programming problem is a typical optimization problem, which has been widely used and studied in the fields of operations research and mathematical programming. The existing general solution is the Lagrange multiplier method, but it involves complex operations, such as matrix inversion, etc., and requires a huge storage space to complete, which is an impossible task for local clients with limited resources . The cloud server can help the client to complete such complex calculations with the help of its powerful computing resources, so that the local client is no longer limited by their resource-constrained devices. [0003] In this era of data explosion, cloud outsourcing services show great c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L63/0428H04L67/10H04L9/0869
Inventor 徐啸任艳丽余凌赞
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products