A Confidentiality Preserving Publicly Verifiable Computation for Multivariate Polynomials

被引:0
|
作者
Sun Jiameng [1 ]
Zhu Binrui [1 ]
Jing, Qin [1 ,2 ]
Ma Jixin [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Univ Greenwich, Sch Comp & Math Sci, Ctr Comp & Computat Sci, London, England
关键词
cloud computing; Big Data; outsourcing computation; high degree polynomial; LARGE-SCALE SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the development of cloud services, outsourcing computation tasks to a commercial cloud server has drawn attentions by various communities, especially in the Big Data age. Public verifiability offers a flexible functionality in real circumstance where the cloud service provider (CSP) may be untrusted or some malicious users may slander the CSP on purpose. However, sometimes the computational result is sensitive and is not willing to be exposed in the public verification phase. In this paper, we present a confidential-preserving public verifiable computation (CP-PVC) scheme for Evaluation of High Degree Polynomials. Compared with previous proposals, our scheme achieves confidentiality of computational result, while not sacrificing the property of public verifiability. We also provide the algorithm and experimental evaluation to show the efficiency of our scheme.
引用
收藏
页码:5 / 12
页数:8
相关论文
共 50 条
  • [1] Confidentiality-Preserving Publicly Verifiable Computation
    Sun, Jiameng
    Zhu, Binrui
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 799 - 818
  • [2] Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
    Sun, Jiameng
    Zhu, Binrui
    Qin, Jing
    Hu, Jiankun
    Ma, Jixin
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [3] Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources
    Song, Wei
    Wang, Bing
    Wang, Qian
    Shi, Chengliang
    Lou, Wenjing
    Peng, Zhiyong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2334 - 2347
  • [4] Hybrid Publicly Verifiable Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 147 - 163
  • [5] Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"
    Wang, Xu An
    Choo, Kim-Kwang Raymond
    Weng, Jian
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1586 - 1588
  • [6] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [7] Secure Collaborative Publicly Verifiable Computation
    Wang, Qiang
    Zhou, Fucai
    Chen, Chunyu
    Xuan, Pengkai
    Wu, Qiyu
    IEEE ACCESS, 2017, 5 : 2479 - 2488
  • [8] Revocation in Publicly Verifiable Outsourced Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 51 - 71
  • [9] Verifiable Computation of Large Polynomials
    Hong, Jiaqi
    Xu, Haixia
    Li, Peili
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 90 - 104
  • [10] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654