Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions

被引:14
|
作者
Zhang, Liang Feng [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Verifiable computation; Public delegation; Public verification; Data privacy; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATION;
D O I
10.1007/s10623-019-00704-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Outsourcing computation has gained significant attention in recent years in particular due to the prevalence of cloud computing. There are two main security concerns in outsourcing computation: guaranteeing that the server performs the computation correctly, and protecting the privacy of the client's data. The verifiable computation of Gennaro, Gentry and Parno addresses both concerns for outsourcing the computation of a function f on an input x to the cloud. The GGP scheme is privately delegatable, privately verifiable, and based on the expensive cryptographic primitives such as fully homomorphic encryption (FHE). In this paper we consider the problem of outsourcing matrix-vector multiplications of the form Fxwhere F is a matrix and xis a column vector, and construct publicly delegatable and publicly verifiable schemes. Our schemes are either input private or function private, highly efficient, and provably secure under the well-established assumptions such as the discrete-logarithm assumption. We decompose a polynomial computation, such as computing a univariate polynomial of arbitrary degree, a bivariate polynomial of arbitrary degree, a quadratic multivariate polynomial, and in general any multivariate polynomial, into a two-step computation in which the computaionally expensive step is a matrix-vector multiplication. We use the matrix schemes to outsource the computation of high-degree polynomials and obtain the first high-degree polynomial outsourcing schemes that simultaneously have public delegation, public verification and input privacy/function privacy.
引用
收藏
页码:677 / 709
页数:33
相关论文
共 50 条
  • [1] Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
    Liang Feng Zhang
    Reihaneh Safavi-Naini
    Designs, Codes and Cryptography, 2020, 88 : 677 - 709
  • [2] Privacy-preserving verifiable delegation of polynomial and matrix functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 153 - 171
  • [3] Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions
    Song, Beibei
    Zhou, Dehua
    Wu, Jiahe
    Yuan, Xiaowei
    Zhu, Yiming
    Wang, Chuansheng
    FUTURE INTERNET, 2023, 15 (04):
  • [4] Publicly Verifiable Delegation of Matrix Operation
    Chen, Lu
    Zhu, Yan-Qin
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CCBD), 2015, : 377 - 384
  • [5] Privacy-Preserving and Publicly Verifiable Matrix Multiplication
    Liu, Jing
    Zhang, Liang Feng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2059 - 2071
  • [6] Robust, privacy protecting and publicly verifiable sealed-bid auction
    Peng, K
    Boyd, C
    Dawson, E
    Viswanathan, K
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 147 - 159
  • [7] Publicly Verifiable Delegation of Set Intersection
    Wang, Tingting
    Zhu, Yanqin
    Luo, Xizhao
    2014 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTERNET OF THINGS (CCIOT), 2014, : 26 - 30
  • [8] Publicly verifiable secure communication with user and data privacy
    Yao Z.
    Mu Y.
    Personal and Ubiquitous Computing, 2022, 26 (03): : 863 - 879
  • [9] Publicly Verifiable Auctions with Privacy
    Germouty, Paul
    Larraia, Enrique
    Zhang, Wei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2023 INTERNATIONAL WORKSHOPS, FC 2023, 2024, 13953 : 420 - 438
  • [10] Efficient Techniques for Publicly Verifiable Delegation of Computation
    Elkhiyaoui, Kaoutar
    Oenen, Melek
    Azraoui, Monir
    Molva, Refik
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 119 - 128