Multi-Client Non-interactive Verifiable Computation

被引:0
|
作者
Choi, Seung Geol [1 ,5 ]
Katz, Jonathan [2 ]
Kumaresan, Ranjit [3 ,5 ]
Cid, Carlos [4 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
[3] Technion, Dept Comp Sci, Haifa, Israel
[4] Royal Holloway Univ London, Egham, Surrey, England
[5] Univ Maryland, College Pk, MD USA
来源
关键词
DELEGATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Gennaro et al. (Crypto 2010) introduced the notion of non-interactive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of inputs (x)(1),... to a more powerful but untrusted server. Following a preprocessing phase ( that is carried out only once), the client sends some representation of its current input x((i)) to the server; the server returns an answer that allows the client to recover the correct result f( x ((i))), accompanied by a proof of correctness that ensures the client does not accept an incorrect result. The crucial property is that the work done by the client in preparing its input and verifying the server's proof is less than the time required for the client to compute f on its own. We extend this notion to the multi-client setting, where n computationally weak clients wish to outsource to an untrusted server the computation of a function f over a series of joint inputs (x(1)((1)),..., x(n)((1))),... without interacting with each other. We present a construction for this setting by combining the scheme of Gennaro et al. with a primitive called proxy oblivious transfer.
引用
收藏
页码:499 / 518
页数:20
相关论文
共 50 条
  • [41] On the (in)efficiency of non-interactive secure multiparty computation
    Yoshida, Maki
    Obana, Satoshi
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (08) : 1793 - 1805
  • [42] Non-Interactive VDF Client Puzzle for DoS Mitigation
    Raikwar, Mayank
    Gligoroski, Danilo
    PROCEEDINGS OF THE 2021 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2021, 2021, : 32 - 38
  • [43] A multi-client messaging protocol for 3D interactive applications
    Paris, L
    Sajja, KM
    Lawhead, PB
    International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 166 - 171
  • [44] Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning
    Zhu, Yin
    Gong, Junqing
    Zhang, Kai
    Qian, Haifeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5600 - 5616
  • [45] Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy
    Luo, Zhilong
    Sun, Shi-Feng
    Wang, Zhedong
    Gu, Dawu
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 281 - 302
  • [46] Paillier-based publicly verifiable (non-interactive) secret sharing
    Jhanwar, Mahabir Prasad
    Venkateswarlu, Ayineedi
    Safavi-Naini, Reihaneh
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 529 - 546
  • [47] Paillier-based publicly verifiable (non-interactive) secret sharing
    Mahabir Prasad Jhanwar
    Ayineedi Venkateswarlu
    Reihaneh Safavi-Naini
    Designs, Codes and Cryptography, 2014, 73 : 529 - 546
  • [48] Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
    Gentry, Craig
    Halevi, Shai
    Lyubashevsky, Vadim
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 458 - 487
  • [49] Non-Interactive Multiparty Computation Without Correlated Randomness
    Halevi, Shai
    Ishai, Yuval
    Jain, Abhishek
    Komargodski, Ilan
    Sahai, Amit
    Yogev, Eylon
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 181 - 211
  • [50] An Efficient Construction of Non-Interactive Secure Multiparty Computation
    Obana, Satoshi
    Yoshida, Maki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 604 - 614