Verifiable Delegation of Computation over Large Datasets

被引:0
|
作者
Benabbas, Siavosh [1 ]
Gennaro, Rosario [2 ]
Vahlis, Yevgeniy [3 ]
机构
[1] Univ Toronto, Toronto, ON M5S 1A1, Canada
[2] IBM Res, Yorktown Hts, NY USA
[3] Columbia Univ, New York, NY 10027 USA
来源
关键词
EFFICIENT; PROOFS; CRYPTOSYSTEMS; ACCUMULATORS; ENCRYPTION; COMPLEXITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry, and Parno in CRYPTO 2010. We present the first practical verifiable computation scheme for high degree polynomial functions. Such functions can be used, for example, to make predictions based on polynomials fitted to a large number of sample points in an experiment. In addition to the many non-ryptographic applications of delegating high degree polynomials, we use our verifiable computation scheme to obtain new solutions for verifiable keyword search, and proofs of retrievability. Our constructions are based on the DDH assumption and its variants, and achieve adaptive security, which was left as an open problem by Gennaro et al (albeit for general functionalities). Our second result is a primitive which we call a verifiable database (VDB). Here, a weak client outsources a large table to an untrusted server, and makes retrieval and update queries. For each query, the server provides a response and a proof that the response was computed correctly. The goal is to minimize the resources required by the client. This is made particularly challenging if the number of update queries is unbounded. We present a VDB scheme based on the hardness of the subgroup membership problem in composite order bilinear groups.
引用
收藏
页码:111 / 131
页数:21
相关论文
共 50 条
  • [21] Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data
    Ngoc Hieu Tran
    Pang, HweeHwa
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 605 - 616
  • [22] Efficient and verifiable outsourcing computation of large-scale nonlinear programming
    Mohammed, Nedal M.
    AL-Seadi, Ali N.
    Lomte, Santosh S.
    Rokade, Poonam M.
    Hamoud, Ahmed A.
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2020, 21 (04): : 335 - 343
  • [23] VerSum: Verifiable Computations over Large Public Logs
    van den Hooff, Jelle
    Kaashoek, M. Frans
    Zeldovich, Nickolai
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1304 - 1316
  • [24] Compact Summaries over Large Datasets
    Cormode, Graham
    PODS'15: PROCEEDINGS OF THE 33RD ACM SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS, 2015, : 157 - 158
  • [25] Refereed delegation of computation
    Canetti, Ran
    Riva, Ben
    Rothblum, Guy N.
    INFORMATION AND COMPUTATION, 2013, 226 : 16 - 36
  • [26] Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets
    Wang, Qiang
    Zhou, Fucai
    Xu, Jian
    Peng, Su
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1201 - 1214
  • [27] Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"
    Wang, Xu An
    Choo, Kim-Kwang Raymond
    Weng, Jian
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1586 - 1588
  • [28] Hybrid Publicly Verifiable Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 147 - 163
  • [29] Independently Verifiable Decentralized Role-Based Delegation
    Tamassia, Roberto
    Yao, Danfeng
    Winsborough, William H.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (06): : 1206 - 1219
  • [30] Geppetto: Versatile Verifiable Computation
    Costello, Craig
    Fournet, Cedric
    Howell, Jon
    Kohlweiss, Markulf
    Kreuter, Benjamin
    Naehrig, Michael
    Parno, Bryan
    Zahur, Samee
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 253 - 270