Multi-Client Non-interactive Verifiable Computation

被引:0
|
作者
Choi, Seung Geol [1 ,5 ]
Katz, Jonathan [2 ]
Kumaresan, Ranjit [3 ,5 ]
Cid, Carlos [4 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
[3] Technion, Dept Comp Sci, Haifa, Israel
[4] Royal Holloway Univ London, Egham, Surrey, England
[5] Univ Maryland, College Pk, MD USA
来源
关键词
DELEGATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Gennaro et al. (Crypto 2010) introduced the notion of non-interactive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of inputs (x)(1),... to a more powerful but untrusted server. Following a preprocessing phase ( that is carried out only once), the client sends some representation of its current input x((i)) to the server; the server returns an answer that allows the client to recover the correct result f( x ((i))), accompanied by a proof of correctness that ensures the client does not accept an incorrect result. The crucial property is that the work done by the client in preparing its input and verifying the server's proof is less than the time required for the client to compute f on its own. We extend this notion to the multi-client setting, where n computationally weak clients wish to outsource to an untrusted server the computation of a function f over a series of joint inputs (x(1)((1)),..., x(n)((1))),... without interacting with each other. We present a construction for this setting by combining the scheme of Gennaro et al. with a primitive called proxy oblivious transfer.
引用
收藏
页码:499 / 518
页数:20
相关论文
共 50 条
  • [21] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [22] Reusable Non-Interactive Secure Computation
    Chase, Melissa
    Dodis, Yevgeniy
    Ishai, Yuval
    Kraschewski, Daniel
    Liu, Tianren
    Ostrovsky, Rafail
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 462 - 488
  • [23] Non-interactive publicly verifiable electronic voting scheme
    Information Engineering Institute, Information Engineering University, Zhengzhou 450002, China
    Kongzhi yu Juece Control Decis, 2006, 1 (107-110):
  • [24] A non-interactive modular verifiable secret sharing scheme
    Li, Q
    Wang, ZF
    Niu, XM
    Sun, SH
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 84 - 87
  • [25] Efficient Non-interactive Secure Computation
    Ishai, Yuval
    Kushilevitz, Eyal
    Ostrovsky, Rafail
    Prabhakaran, Manoj
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 406 - +
  • [26] Succinct Non-interactive Secure Computation
    Morgan, Andrew
    Pass, Rafael
    Polychroniadou, Antigoni
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 216 - 245
  • [27] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Mashahdi, Samaneh
    Bagherpour, Bagher
    Zaghian, Ali
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (08) : 1761 - 1782
  • [28] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Samaneh Mashahdi
    Bagher Bagherpour
    Ali Zaghian
    Designs, Codes and Cryptography, 2022, 90 : 1761 - 1782
  • [29] AntNest: Fully Non-Interactive Secure Multi-Party Computation
    Zhou, Lijing
    Wang, Licheng
    Sun, Yiru
    Ai, Tianyi
    IEEE ACCESS, 2018, 6 : 75639 - 75649
  • [30] moKHS: A More Lightweight Model for Multi-Client Delegatable Computation
    Li, Shimin
    Wang, Xin
    Xue, Rui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1902 - 1917