The Security Matrix Factorization Agreement with Two Parties

In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer 1 out of k protocol, successfully construct confidential computing protocols of matrix general factorization and QR factorization. On the model of semi-honest, it can meet the confidentiality. At the same time, the method of this protocol is also suitable for confidential computing of matrix other factorizations.