Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions

被引:14
|
作者
Zhang, Liang Feng [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Verifiable computation; Public delegation; Public verification; Data privacy; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATION;
D O I
10.1007/s10623-019-00704-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Outsourcing computation has gained significant attention in recent years in particular due to the prevalence of cloud computing. There are two main security concerns in outsourcing computation: guaranteeing that the server performs the computation correctly, and protecting the privacy of the client's data. The verifiable computation of Gennaro, Gentry and Parno addresses both concerns for outsourcing the computation of a function f on an input x to the cloud. The GGP scheme is privately delegatable, privately verifiable, and based on the expensive cryptographic primitives such as fully homomorphic encryption (FHE). In this paper we consider the problem of outsourcing matrix-vector multiplications of the form Fxwhere F is a matrix and xis a column vector, and construct publicly delegatable and publicly verifiable schemes. Our schemes are either input private or function private, highly efficient, and provably secure under the well-established assumptions such as the discrete-logarithm assumption. We decompose a polynomial computation, such as computing a univariate polynomial of arbitrary degree, a bivariate polynomial of arbitrary degree, a quadratic multivariate polynomial, and in general any multivariate polynomial, into a two-step computation in which the computaionally expensive step is a matrix-vector multiplication. We use the matrix schemes to outsource the computation of high-degree polynomials and obtain the first high-degree polynomial outsourcing schemes that simultaneously have public delegation, public verification and input privacy/function privacy.
引用
收藏
页码:677 / 709
页数:33
相关论文
共 50 条
  • [31] A new publicly verifiable data possession on remote storage
    Tang, Chun-ming
    Zhang, Xiao-jun
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 77 - 91
  • [32] Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy
    Luo, Zhilong
    Sun, Shi-Feng
    Wang, Zhedong
    Gu, Dawu
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 281 - 302
  • [33] Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
    Fatemeh Erfan
    Hamid Mala
    Cluster Computing, 2020, 23 : 2835 - 2845
  • [34] Efficient and Publicly Verifiable Outsourcing of Large-scale Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    Cai, Yunlu
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (04): : 1253 - 1261
  • [35] A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts
    Wang, Hao
    Ge, Chunpeng
    Zhou, Lu
    Liu, Zhe
    Lan, Dongwan
    Lu, Xiaozhen
    Jiang, Danni
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 70 - 83
  • [36] Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
    Erfan, Fatemeh
    Mala, Hamid
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2835 - 2845
  • [37] Publicly-Verifiable Deletion via Target-Collapsing Functions
    Bartusek, James
    Khurana, Dakshita
    Poremba, Alexander
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 99 - 128
  • [38] Protecting research data of publicly revealing participants
    McKibbin, Kyle J.
    Malin, Bradley A.
    Clayton, Ellen Wright
    JOURNAL OF LAW AND THE BIOSCIENCES, 2021, 8 (02):
  • [39] Publicly verifiable data transfer and deletion scheme for cloud storage
    Yang, Changsong
    Tao, Xiaoling
    Zhao, Feng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (10)
  • [40] Publicly Verifiable Private Aggregation of Time-Series Data
    Bakondi, Bence
    Peter, Andreas
    Everts, Maarten
    Hartel, Pieter
    Jonker, Willem
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 50 - 59