A Confidentiality Preserving Publicly Verifiable Computation for Multivariate Polynomials

被引:0
|
作者
Sun Jiameng [1 ]
Zhu Binrui [1 ]
Jing, Qin [1 ,2 ]
Ma Jixin [3 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Univ Greenwich, Sch Comp & Math Sci, Ctr Comp & Computat Sci, London, England
关键词
cloud computing; Big Data; outsourcing computation; high degree polynomial; LARGE-SCALE SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the development of cloud services, outsourcing computation tasks to a commercial cloud server has drawn attentions by various communities, especially in the Big Data age. Public verifiability offers a flexible functionality in real circumstance where the cloud service provider (CSP) may be untrusted or some malicious users may slander the CSP on purpose. However, sometimes the computational result is sensitive and is not willing to be exposed in the public verification phase. In this paper, we present a confidential-preserving public verifiable computation (CP-PVC) scheme for Evaluation of High Degree Polynomials. Compared with previous proposals, our scheme achieves confidentiality of computational result, while not sacrificing the property of public verifiability. We also provide the algorithm and experimental evaluation to show the efficiency of our scheme.
引用
收藏
页码:5 / 12
页数:8
相关论文
共 50 条
  • [41] Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
    Chung, Kai-Min
    Huang, Mi-Ying
    Tang, Er-Cheng
    Zhang, Jiapeng
    ADVANCES IN CRYPTOLOGY, PT VII, EUROCRYPT 2024, 2024, 14657 : 119 - 148
  • [42] MD-vcMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 349 - 362
  • [43] Publicly verifiable authenticated encryption
    Wen, HA
    Lo, CM
    Hwang, T
    ELECTRONICS LETTERS, 2003, 39 (19) : 1382 - 1383
  • [44] Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3671 - 3687
  • [45] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [46] Publicly Verifiable Auctions with Privacy
    Germouty, Paul
    Larraia, Enrique
    Zhang, Wei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2023 INTERNATIONAL WORKSHOPS, FC 2023, 2024, 13953 : 420 - 438
  • [47] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282
  • [48] Robust computation methods for sparse interpolation of multivariate polynomials
    Kondo, Kazuki
    Sekigawa, Hiroshi
    ACM COMMUNICATIONS IN COMPUTER ALGEBRA, 2019, 53 (03): : 130 - 133
  • [49] Public Verifiable Privacy-Preserving Multi-Party Computation on Blockchain
    Zhang, Ziyan
    Chen, Liquan
    Jiang, Xinzao
    Yang, Bo
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 531 - 537
  • [50] Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems
    Toreini, Ehsan
    Mehrnezhad, Maryam
    van Moorsel, Aad
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 569 - 584