Multi-Client Non-interactive Verifiable Computation

被引:0
|
作者
Choi, Seung Geol [1 ,5 ]
Katz, Jonathan [2 ]
Kumaresan, Ranjit [3 ,5 ]
Cid, Carlos [4 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
[3] Technion, Dept Comp Sci, Haifa, Israel
[4] Royal Holloway Univ London, Egham, Surrey, England
[5] Univ Maryland, College Pk, MD USA
来源
关键词
DELEGATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Gennaro et al. (Crypto 2010) introduced the notion of non-interactive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of inputs (x)(1),... to a more powerful but untrusted server. Following a preprocessing phase ( that is carried out only once), the client sends some representation of its current input x((i)) to the server; the server returns an answer that allows the client to recover the correct result f( x ((i))), accompanied by a proof of correctness that ensures the client does not accept an incorrect result. The crucial property is that the work done by the client in preparing its input and verifying the server's proof is less than the time required for the client to compute f on its own. We extend this notion to the multi-client setting, where n computationally weak clients wish to outsource to an untrusted server the computation of a function f over a series of joint inputs (x(1)((1)),..., x(n)((1))),... without interacting with each other. We present a construction for this setting by combining the scheme of Gennaro et al. with a primitive called proxy oblivious transfer.
引用
收藏
页码:499 / 518
页数:20
相关论文
共 50 条
  • [1] A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme
    Xu, Shuaijianni
    Zhang, Liang
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 195 - 206
  • [2] Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation
    Sun, Shi-Feng
    Zuo, Cong
    Liu, Joseph K.
    Sakzad, Amin
    Steinfeld, Ron
    Yuen, Tsz Hon
    Yuan, Xingliang
    Gu, Dawu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 452 - 467
  • [3] Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage
    Zhang, Hanqi
    Xu, Chang
    Lu, Rongxing
    Zhu, Liehuang
    Zhang, Chuan
    Guan, Yunguo
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3972 - 3985
  • [4] Multi-Client Verifiable Computation Service for Outsourced Data
    Wu, Ying
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 556 - 563
  • [5] Multi-Client Verifiable Computation with Stronger Security Guarantees
    Gordon, S. Dov
    Katz, Jonathan
    Liu, Feng-Hao
    Shi, Elaine
    Zhou, Hong-Sheng
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 144 - 168
  • [6] Multi-client verifiable computation with stronger security guarantees
    Gordon, S. Dov
    Katz, Jonathan
    Liu, Feng-Hao
    Shi, Elaine
    Zhou, Hong-Sheng
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9015 : 144 - 168
  • [7] A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting
    Sun, Lixue
    Xu, Chunxiang
    Zhang, Yuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 145 - 155
  • [8] An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
    Sun, Shi-Feng
    Liu, Joseph K.
    Sakzad, Amin
    Steinfeld, Ron
    Yuen, Tsz Hon
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 154 - 172
  • [9] RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol
    Lafourcade, Pascal
    Marcadet, Gael
    Robert, Leo
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1558 - 1565
  • [10] MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients
    Wang, Xingkai
    Cao, Zhenfu
    Liu, Zhen
    Liang, Kaitai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1640 - 1654