{"id":"https://openalex.org/W4388692076","doi":"https://doi.org/10.1109/tdsc.2023.3333256","title":"SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks","display_name":"SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388692076","doi":"https://doi.org/10.1109/tdsc.2023.3333256"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3333256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3333256","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101717611","display_name":"Chun Liu","orcid":"https://orcid.org/0000-0003-2622-3635"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chun Liu","raw_affiliation_strings":["Systems Engineering Institute, Academy of Military Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Systems Engineering Institute, Academy of Military Sciences, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082517684","display_name":"Xuexian Hu","orcid":"https://orcid.org/0000-0001-9778-9463"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuexian Hu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi&#x2019;an, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China and the State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China and the State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002582574","display_name":"Jianghong Wei","orcid":"https://orcid.org/0000-0002-0286-7973"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianghong Wei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China and State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China and State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159","https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091311315","display_name":"Wenfen Liu","orcid":"https://orcid.org/0000-0001-5601-8347"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenfen Liu","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","Guangxi Key Laboratory of Cryptogpraphy and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptogpraphy and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101717611"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9266,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88975187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3469","last_page":"3486"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11716","display_name":"Random Matrices and Applications","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9573000073432922,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7684624791145325},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.758492112159729},{"id":"https://openalex.org/keywords/invertible-matrix","display_name":"Invertible matrix","score":0.6660975217819214},{"id":"https://openalex.org/keywords/matrix-multiplication","display_name":"Matrix multiplication","score":0.5654100775718689},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.500056266784668},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.4783182442188263},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43255114555358887},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4219369888305664},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3281969428062439},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30095621943473816},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17540395259857178}],"concepts":[{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7684624791145325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758492112159729},{"id":"https://openalex.org/C96442724","wikidata":"https://www.wikidata.org/wiki/Q242188","display_name":"Invertible matrix","level":2,"score":0.6660975217819214},{"id":"https://openalex.org/C17349429","wikidata":"https://www.wikidata.org/wiki/Q1049914","display_name":"Matrix multiplication","level":3,"score":0.5654100775718689},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.500056266784668},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.4783182442188263},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43255114555358887},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4219369888305664},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3281969428062439},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30095621943473816},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17540395259857178},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3333256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3333256","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2042048059","display_name":null,"funder_award_id":"232300421099","funder_id":"https://openalex.org/F4320323845","funder_display_name":"Natural Science Foundation of Henan Province"},{"id":"https://openalex.org/G2581897320","display_name":null,"funder_award_id":"62172433","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6036666804","display_name":null,"funder_award_id":"62172434","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8362771766","display_name":null,"funder_award_id":"61960206014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8526564412","display_name":null,"funder_award_id":"2021T140531","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320323845","display_name":"Natural Science Foundation of Henan Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W2788012436","https://openalex.org/W200604156","https://openalex.org/W4231184955","https://openalex.org/W2374784346","https://openalex.org/W4286615217","https://openalex.org/W3154723744"],"abstract_inverted_index":{"Matrix":[0],"multiplication":[1,214],"computation":[2,43],"(MMC)":[3],"is":[4,129,157],"one":[5],"of":[6,15,47,108,148,168,203,220,264],"the":[7,18,45,80,105,112,140,145,149,169,195,199,221,229,271],"most":[8],"important":[9],"basic":[10],"operations":[11],"with":[12,36,267],"a":[13,59,158,181,188,283],"variety":[14],"applications":[16],"in":[17,41,111,262],"scientific":[19],"and":[20,29,84,128,166,187,253,289],"engineering":[21],"community,":[22],"including":[23],"linear":[24,249],"regression,":[25],"k-nearest":[26],"neighbor":[27],"classification":[28],"biometric":[30],"identification.":[31],"However,":[32],"performing":[33],"these":[34],"tasks":[35,53,127,239,246],"large-scale":[37],"datasets":[38],"can":[39,120],"result":[40],"significant":[42],"beyond":[44],"capabilities":[46],"resource-constrained":[48],"clients.":[49],"As":[50],"outsourcing":[51,71,81,172,190],"intensive":[52],"to":[54,124,143,197,216,231,237,242,270],"cloud":[55],"server":[56],"has":[57,281],"become":[58],"promising":[60],"method,":[61],"many":[62],"matrix-transformation-based":[63,170],"privacy-protected":[64,171,189,223],"schemes":[65],"have":[66],"been":[67],"presented":[68],"for":[69,79,89,132],"certain":[70],"tasks,":[72],"such":[73,136,247],"as":[74,137,248],"Lei":[75,94,204],"et":[76,86,95,117,205],"al's":[77,87,96,118,206],"scheme":[78,88,97,119,192,273,280],"MMC":[82,191,238],"task":[83,160],"Zhao":[85,116],"matrix":[90,147,156,185,276],"determinant":[91],"computation.":[92],"Nevertheless,":[93],"suffers":[98],"from":[99],"inherent":[100,200],"security":[101,201],"flaws":[102,202],"that":[103,161,256],"reveal":[104],"statistical":[106],"information":[107],"zero":[109],"elements":[110],"original":[113],"data.":[114],"Additionally,":[115],"only":[121,236],"be":[122,232],"applied":[123,234],"specific":[125],"outsourced":[126,245],"not":[130,235],"suitable":[131],"more":[133,260],"universal":[134],"situations,":[135],"MMC,":[138],"where":[139],"client":[141],"needs":[142],"compute":[144],"inverse":[146],"secret":[150],"key.":[151],"Therefore,":[152],"designing":[153],"an":[154,211],"invertible":[155,184],"difficult":[159],"affects":[162],"privacy":[163],"security,":[164,287],"efficiency,":[165],"universality":[167],"computing":[173],"scheme.":[174,207,224],"To":[175],"address":[176],"this":[177],"challenge,":[178],"we":[179],"propose":[180,210],"subtly":[182],"designed":[183],"(SDIM)":[186],"based":[193,274],"on":[194,275],"SDIM":[196,230],"remedy":[198],"We":[208],"also":[209,227,241],"optimized":[212],"matrix-chain":[213],"method":[215],"maintain":[217],"high":[218],"efficiency":[219,269,288],"SDIM-based":[222,279],"This":[225,278],"optimization":[226],"allows":[228],"universally":[233],"but":[240],"other":[243],"related":[244],"regression.":[250],"Theoretical":[251],"analyses":[252],"experiments":[254],"show":[255],"our":[257],"methods":[258],"are":[259],"secure":[261],"terms":[263],"data":[265],"privacy,":[266],"comparable":[268],"state-of-the-art":[272],"transformation.":[277],"achieved":[282],"well-balanced":[284],"trade-off":[285],"between":[286],"universality.":[290]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
