Secure Replication-Based Outsourced Computation Using Smart Contracts

被引:3
|
作者
Susilo, Willy [1 ]
Guo, Fuchun [1 ]
Zhao, Zhen [2 ,3 ]
Jiang, Yinhao [4 ,5 ]
Ge, Chunpeng [6 ,7 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[4] Charles Sturt Univ, Sch Comp & Math, Bathurst, NSW 2795, Australia
[5] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[6] Shandong Univ, Software Sch, Joint SDU NTU Ctr Artificial Intelligence Res C F, Wollongong, NSW 2522, Australia
[7] Univ ofWollongong, Wollongong, NSW 2522, Australia
关键词
Lazy contractors; outsourced computation; public-key encryption with equality test; smart contracts; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; AUTHORIZED EQUALITY TEST; EFFICIENT; CIPHERTEXTS; SCHEME;
D O I
10.1109/TSC.2023.3262805
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The replication-Based Outsourced Computation (RBOC) mechanism allows a client to outsource the same computing job to multiple contractors and the honest contractors will get paid in the incentivized system based on the fact that a majority of contractors will honestly perform the computation. As self-executing contracts, smart contracts are utilized in the decentralized blockchain networks to execute coded programs automatically transparently, and publicly. It is natural to apply smart contracts to RBOC to improve performance by setting smart contracts as the converter between the client and contractors to reduce the load on the client. However, it is infeasible to directly combine these two blocks together because the data including returned computing results from contractors in the decentralized blockchain are in the form of plaintexts such that some lazy contractors could copy others' results as their own and still get paid, which will compromise the security of RBOC. The existing public-key encryption with equality test (PKEET) is a promising candidate solution to stop the above lazy contractors, where the results are encrypted by PKEET and then transferred without hindering smart contracts to compare the equality of underlying results. Unfortunately, we found that the advanced lazy contractors can still compromise security by forging ciphertexts to pass the equality test only with the encrypted results of other contractors. In this paper, to achieve security against lazy contractors, we introduce the notion of PKEET against lazy encryptors (PKEET-LE). Besides the fundamental property of PKEET that performs equality test on ciphertexts without decryption, PKEET-LE additionally realizes the security against the lazy encryptors who aim to forge a ciphertext for a given one to pass the equality test between them without the knowledge of the underlying plaintext. We further propose a concrete and practical PKEET-LE construction along with formal security proof. Finally, we conduct a performance evaluation to demonstrate that our PKEET-LE scheme is efficient and practical in the RBOC system using smart contracts.
引用
收藏
页码:3711 / 3722
页数:12
相关论文
共 50 条
  • [1] Secure Outsourced Computation
    Loftus, Jake
    Smart, Nigel P.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 1 - 20
  • [2] Optimal contracts for outsourced computation
    Pham, Viet
    Khouzani, M.H.R.
    Cid, Carlos
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8840 : 79 - 98
  • [3] Optimal Contracts for Outsourced Computation
    Viet Pham
    Khouzani, M. H. R.
    Cid, Carlos
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 79 - 98
  • [4] Verifiable Computation using Smart Contracts
    Avizheh, Sepideh
    Nabi, Mahmudun
    Safavi-Naini, Reihaneh
    Venkateswarlu, Muni K.
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 17 - 28
  • [5] Secure outsourced computation of iris matching
    Blanton, Marina
    Aliasgari, Mehrdad
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (2-3) : 259 - 305
  • [6] Refereed Delegation of Computation Using Smart Contracts
    Avizheh, Sepideh
    Nabi, Mahmudun
    Safavi-Naini, Reihaneh
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5208 - 5227
  • [7] Replication-Based Load Balancing
    Nahir, Amir
    Orda, Ariel
    Raz, Danny
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 494 - 507
  • [8] SOCI: A Toolkit for Secure Outsourced Computation on Integers
    Zhao, Bowen
    Yuan, Jiaming
    Liu, Ximeng
    Wu, Yongdong
    Pang, Hwee Hwa
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3637 - 3648
  • [9] Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption
    Zong, Haoran
    Huang, Hai
    Wang, Shufang
    IEEE ACCESS, 2021, 9 : 22651 - 22661
  • [10] Replication-based incremental compaction
    Ugawa, Tomoharu
    Yasugi, Masahiro
    Yuasa, Taiichi
    ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, 2008, : 516 - 524