Secure and Efficient Outsourcing of Matrix Multiplication based on Secret Sharing Scheme using only One Server

In this paper, we propose secure and efficient outsourcing of matrix multiplication based on secret sharing scheme and using only one server. Matrix multiplication has been widely used in the field of machine learning, including deep learning. However, as the size of a matrix becomes larger, the computational complexity becomes more enormous (e.g., matrix multiplication between two m × $m$ matrices can be done with O($m$ 3) complexity). Because of the limited performance or storage on the device, it is impossible for an individual to perform such large-scale computations. To solve this problem, the technology that enables the consumer as a client to outsource computation securely to a high-performance server in the cloud, namely, secure outsourcing computation is studied. Our method is realized by multiplying some shares of a secret by different random numbers. The proposed method removes the disadvantage of secret sharing scheme that needs multiple servers to perform operations of less computational complexity than those of the method based on homomorphic encryption. We prove the security of our method against not only passive but also active adversaries. In addition, we show that our method is more efficient than existing methods of secure outsourcing computation.

[1]  Ming Xu,et al.  Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations , 2016, 2016 IEEE International Conference on Communications (ICC).

[2]  Xuhui Chen,et al.  A tutorial on secure outsourcing of large-scale computations for big data , 2016, IEEE Access.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Kim-Kwang Raymond Choo,et al.  Secure outsourcing of modular exponentiations under single untrusted programme model , 2017, J. Comput. Syst. Sci..

[5]  Demis Hassabis,et al.  Mastering the game of Go with deep neural networks and tree search , 2016, Nature.

[6]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Marina Blanton,et al.  Practical Secure Computation Outsourcing , 2018, ACM Comput. Surv..

[8]  Tingwen Huang,et al.  Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..

[9]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[10]  Rongxing Lu,et al.  Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability , 2018, IEEE Internet of Things Journal.

[11]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[12]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.