Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions

被引:14
|
作者
Zhang, Liang Feng [1 ]
Safavi-Naini, Reihaneh [2 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Verifiable computation; Public delegation; Public verification; Data privacy; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATION;
D O I
10.1007/s10623-019-00704-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Outsourcing computation has gained significant attention in recent years in particular due to the prevalence of cloud computing. There are two main security concerns in outsourcing computation: guaranteeing that the server performs the computation correctly, and protecting the privacy of the client's data. The verifiable computation of Gennaro, Gentry and Parno addresses both concerns for outsourcing the computation of a function f on an input x to the cloud. The GGP scheme is privately delegatable, privately verifiable, and based on the expensive cryptographic primitives such as fully homomorphic encryption (FHE). In this paper we consider the problem of outsourcing matrix-vector multiplications of the form Fxwhere F is a matrix and xis a column vector, and construct publicly delegatable and publicly verifiable schemes. Our schemes are either input private or function private, highly efficient, and provably secure under the well-established assumptions such as the discrete-logarithm assumption. We decompose a polynomial computation, such as computing a univariate polynomial of arbitrary degree, a bivariate polynomial of arbitrary degree, a quadratic multivariate polynomial, and in general any multivariate polynomial, into a two-step computation in which the computaionally expensive step is a matrix-vector multiplication. We use the matrix schemes to outsource the computation of high-degree polynomials and obtain the first high-degree polynomial outsourcing schemes that simultaneously have public delegation, public verification and input privacy/function privacy.
引用
收藏
页码:677 / 709
页数:33
相关论文
共 50 条
  • [41] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [42] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 799 - 813
  • [43] Verifiable and Practical Compliance for Data Privacy Laws
    Awasthi, Manu
    2022 IEEE 29TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA AND ANALYTICS WORKSHOP, HIPCW, 2022, : 59 - 60
  • [44] Publicly Verifiable Grouped Aggregation Queries on Outsourced Data Streams
    Nath, Suman
    Venkatesan, Ramarathnam
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 517 - 528
  • [45] Sharing data - protecting privacy
    不详
    R&D MAGAZINE, 2006, 48 (06): : 14 - 14
  • [46] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [47] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [48] On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1296 - 1298
  • [49] A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
    Fouladgars, Sepideh
    Afifi, Hossam
    Journal of Communications, 2007, 2 (06): : 6 - 13
  • [50] Towards privacy-preserving and verifiable federated matrix factorization
    Wan, Xicheng
    Zheng, Yifeng
    Li, Qun
    Fu, Anmin
    Su, Mang
    Gao, Yansong
    KNOWLEDGE-BASED SYSTEMS, 2022, 250