Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"
The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme uti...
Gespeichert in:
Veröffentlicht in: | IEEE access 2024, Vol.12, p.116013-116016 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2024.3443095 |