JOURNAL ARTICLE

Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme

Liwei KuangLaurence T. YangJun FengMianxiong Dong

Year: 2015 Journal:   IEEE Transactions on Cloud Computing Vol: 6 (3)Pages: 868-878   Publisher: Institute of Electrical and Electronics Engineers

Abstract

As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing.

Keywords:
Computer science Homomorphic encryption Encryption Tensor (intrinsic definition) Theoretical computer science Cloud computing Cryptography Probabilistic encryption Algorithm Mathematics Computer security

Metrics

39
Cited By
1.12
FWCI (Field Weighted Citation Impact)
42
Refs
0.77
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Tensor decomposition and applications
Physical Sciences →  Mathematics →  Computational Mathematics
Parallel Computing and Optimization Techniques
Physical Sciences →  Computer Science →  Hardware and Architecture
Algorithms and Data Compression
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Fully Homomorphic Encryption Scheme Based on Decomposition Ring

Seiko AritaSari Handa

Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Year: 2019 Vol: E103.A (1)Pages: 195-211
JOURNAL ARTICLE

Secure signal processing using fully homomorphic encryption

Thomas ShortellAli Shokoufandeh

Journal:   IET Information Security Year: 2019 Vol: 14 (1)Pages: 51-59
BOOK-CHAPTER

Secure Signal Processing Using Fully Homomorphic Encryption

Thomas ShortellAli Shokoufandeh

Lecture notes in computer science Year: 2015 Pages: 93-104
© 2026 ScienceGate Book Chapters — All rights reserved.