I. Introduction
With the development of cloud computing technology, cloud service providers can provide data outsourcing computing services with ultra-high computing power and large storage capacity, which has attracted widespread attention from academia and industry. However, in some special application scenarios (such as medical treatment, finance, biological experiments, etc.), the data to be calculated is often highly sensitive. Therefore, there is an urgent need to embed privacy protection schemes in these outsourced services to ensure that computations can be performed without data disclosure. A major number of literature [1], [2], [3], [4], [5] have proposed work on protecting the confidentiality of outsourced computing.