Verifiable Delegation of Computation over Large Datasets

被引:0
|
作者
Benabbas, Siavosh [1 ]
Gennaro, Rosario [2 ]
Vahlis, Yevgeniy [3 ]
机构
[1] Univ Toronto, Toronto, ON M5S 1A1, Canada
[2] IBM Res, Yorktown Hts, NY USA
[3] Columbia Univ, New York, NY 10027 USA
来源
关键词
EFFICIENT; PROOFS; CRYPTOSYSTEMS; ACCUMULATORS; ENCRYPTION; COMPLEXITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry, and Parno in CRYPTO 2010. We present the first practical verifiable computation scheme for high degree polynomial functions. Such functions can be used, for example, to make predictions based on polynomials fitted to a large number of sample points in an experiment. In addition to the many non-ryptographic applications of delegating high degree polynomials, we use our verifiable computation scheme to obtain new solutions for verifiable keyword search, and proofs of retrievability. Our constructions are based on the DDH assumption and its variants, and achieve adaptive security, which was left as an open problem by Gennaro et al (albeit for general functionalities). Our second result is a primitive which we call a verifiable database (VDB). Here, a weak client outsources a large table to an untrusted server, and makes retrieval and update queries. For each query, the server provides a response and a proof that the response was computed correctly. The goal is to minimize the resources required by the client. This is made particularly challenging if the number of update queries is unbounded. We present a VDB scheme based on the hardness of the subgroup membership problem in composite order bilinear groups.
引用
收藏
页码:111 / 131
页数:21
相关论文
共 50 条
  • [1] Verifiable Outsourced Computation with Full Delegation
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Zifeng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 270 - 287
  • [2] Efficient Techniques for Publicly Verifiable Delegation of Computation
    Elkhiyaoui, Kaoutar
    Oenen, Melek
    Azraoui, Monir
    Molva, Refik
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 119 - 128
  • [3] Verifiable Computation over Large Database with Incremental Updates
    Chen, Xiaofeng
    Li, Jin
    Weng, Jian
    Ma, Jianfeng
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 3184 - 3195
  • [4] Verifiable Computation over Large Database with Incremental Updates
    Chen, Xiaofeng
    Li, Jin
    Weng, Jian
    Ma, Jianfeng
    Lou, Wenjing
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 148 - 162
  • [5] Fast, private and verifiable: Server-aided approximate similarity computation over large-scale datasets
    Department of Information Security, Beijing Jiaotong University, Beijing
    100044, China
    不详
    AZ
    85721-0104, United States
    不详
    UT
    84322, United States
    SCC - Proc. ACM Int. Workshop Secur. Cloud Comput., Co-located Asia CCS, 1600, (29-36):
  • [6] Verifiable Computation of Large Polynomials
    Hong, Jiaqi
    Xu, Haixia
    Li, Peili
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 90 - 104
  • [7] An Efficient Architecture for Parallel Skyline Computation over Large Distributed Datasets
    Li, He
    Jang, Sumin
    Yoo, Jaesoo
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (04): : 577 - 588
  • [8] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [9] Efficient verifiable computation over quotient polynomial rings
    Park, Jai Hyun
    Cheon, Jung Hee
    Kim, Dongwoo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022,
  • [10] Efficient verifiable computation over quotient polynomial rings
    Park, Jai Hyun
    Cheon, Jung Hee
    Kim, Dongwoo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (05) : 953 - 971