Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions

被引:14
|
作者
Zhang, Liang Feng [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Verifiable computation; Public delegation; Public verification; Data privacy; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATION;
D O I
10.1007/s10623-019-00704-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Outsourcing computation has gained significant attention in recent years in particular due to the prevalence of cloud computing. There are two main security concerns in outsourcing computation: guaranteeing that the server performs the computation correctly, and protecting the privacy of the client's data. The verifiable computation of Gennaro, Gentry and Parno addresses both concerns for outsourcing the computation of a function f on an input x to the cloud. The GGP scheme is privately delegatable, privately verifiable, and based on the expensive cryptographic primitives such as fully homomorphic encryption (FHE). In this paper we consider the problem of outsourcing matrix-vector multiplications of the form Fxwhere F is a matrix and xis a column vector, and construct publicly delegatable and publicly verifiable schemes. Our schemes are either input private or function private, highly efficient, and provably secure under the well-established assumptions such as the discrete-logarithm assumption. We decompose a polynomial computation, such as computing a univariate polynomial of arbitrary degree, a bivariate polynomial of arbitrary degree, a quadratic multivariate polynomial, and in general any multivariate polynomial, into a two-step computation in which the computaionally expensive step is a matrix-vector multiplication. We use the matrix schemes to outsource the computation of high-degree polynomials and obtain the first high-degree polynomial outsourcing schemes that simultaneously have public delegation, public verification and input privacy/function privacy.
引用
收藏
页码:677 / 709
页数:33
相关论文
共 50 条
  • [21] New publicly verifiable computation for batch matrix multiplication
    Zhang, Xiaoyu
    Jiang, Tao
    Li, Kuan-Ching
    Castiglione, Aniello
    Chen, Xiaofeng
    INFORMATION SCIENCES, 2019, 479 : 664 - 678
  • [22] New Publicly Verifiable Computation for Batch Matrix Multiplication
    Zhang, Xiaoyu
    Jiang, Tao
    Li, Kuan-Ching
    Chen, Xiaofeng
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 53 - 65
  • [23] Fully-Succinct Publicly Verifiable Delegation from Constant-Size Assumptions
    Gonzalez, Alonso
    Zacharakis, Alexandros
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 529 - 557
  • [24] A privacy-preserving publicly verifiable quantum random number generator
    Islam, Tanvirul
    Banerji, Anindya
    Boon, Chin Jia
    Rui, Wang
    Reezwana, Ayesha
    Grieve, James A.
    Piera, Rodrigo
    Ling, Alexander
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [25] Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy
    Peng, Kun
    Bao, Feng
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 118 - 132
  • [26] Publicly verifiable privacy-preserving aggregation and its application in IoT
    Li, Tong
    Gao, Chongzhi
    Jiang, Liaoliang
    Pedrycz, Witold
    Shen, Jian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 39 - 44
  • [27] A Fair, Verifiable and Privacy-Protecting Data Outsourcing Transaction Scheme Based on Smart Contracts
    Li, Lina
    Zhang, Tingting
    Sun, Guodong
    Jin, Dezheng
    Li, Nianfeng
    IEEE ACCESS, 2022, 10 : 106873 - 106885
  • [28] Privacy-preserving Revocation of Verifiable Credentials with Verifiable Random Functions
    Papathanasiou, Athanasia Maria
    Polyzos, George C.
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 391 - 394
  • [29] Enabling Efficient Publicly Verifiable Outsourcing Computation for Matrix Multiplication
    Li, Hongwei
    Zhang, Shenmin
    Luan, Tom H.
    Ren, Hao
    Dai, Yuanshun
    Zhou, Liang
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 44 - 50
  • [30] A new publicly verifiable data possession on remote storage
    Chun-ming Tang
    Xiao-jun Zhang
    The Journal of Supercomputing, 2019, 75 : 77 - 91