Optimal Contracts for Outsourced Computation

被引:0
|
作者
Viet Pham [1 ]
Khouzani, M. H. R. [1 ]
Cid, Carlos [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., "lazy-but-honest" contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and "redundancy". Our contracts provably minimize the expense of the outsourcer (principal) while guaranteeing correct computation. Furthermore, we incorporate practical restrictions of the maximum enforceable fine, limited and/or costly auditing, and bounded budget of the outsourcer. By examining the optimal contracts, we provide insights on how resources should be utilized when auditing capacity and enforceability are limited. Finally, we present a light-weight cryptographic implementation of the contracts to mitigate the double moral hazard problem between the principal and the agents.
引用
下载
收藏
页码:79 / 98
页数:20
相关论文
共 50 条
  • [1] Optimal contracts for outsourced computation
    Pham, Viet
    Khouzani, M.H.R.
    Cid, Carlos
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8840 : 79 - 98
  • [2] Secure Replication-Based Outsourced Computation Using Smart Contracts
    Susilo, Willy
    Guo, Fuchun
    Zhao, Zhen
    Jiang, Yinhao
    Ge, Chunpeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3711 - 3722
  • [3] Secure Outsourced Computation
    Loftus, Jake
    Smart, Nigel P.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 1 - 20
  • [4] Verifiable Outsourced Computation: A Survey
    Gennaro, Rosario
    PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17), 2017, : 313 - 313
  • [5] Verifiable Outsourced Computation with Full Delegation
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Zifeng
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 270 - 287
  • [6] Secure outsourced computation of iris matching
    Blanton, Marina
    Aliasgari, Mehrdad
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (2-3) : 259 - 305
  • [7] Batch verifiable computation of outsourced functions
    Liang Feng Zhang
    Reihaneh Safavi-Naini
    Designs, Codes and Cryptography, 2015, 77 : 563 - 585
  • [8] Revocation in Publicly Verifiable Outsourced Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 51 - 71
  • [9] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [10] Batch verifiable computation of outsourced functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 563 - 585