Comments on 'Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud'
| dc.contributor.author | Rath, S. | |
| dc.contributor.author | Ramalingam, J. | |
| dc.date.accessioned | 2026-02-08T18:38:34Z | |
| dc.date.issued | 2024 | |
| dc.description.abstract | The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li. © 2013 IEEE. | |
| dc.identifier.citation | IEEE Access, 2024, Vol.12, , p.116013 -116016 | |
| dc.identifier.uri | https://doi.org/10.1109/ACCESS.2024.3443095 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/34216 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.subject | Eigen decomposition | |
| dc.subject | Robust verification | |
| dc.subject | singular value decomposition | |
| dc.title | Comments on 'Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud' |
