Optimal Contracts for Outsourced Computation

被引:0
|
作者
Viet Pham [1 ]
Khouzani, M. H. R. [1 ]
Cid, Carlos [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., "lazy-but-honest" contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and "redundancy". Our contracts provably minimize the expense of the outsourcer (principal) while guaranteeing correct computation. Furthermore, we incorporate practical restrictions of the maximum enforceable fine, limited and/or costly auditing, and bounded budget of the outsourcer. By examining the optimal contracts, we provide insights on how resources should be utilized when auditing capacity and enforceability are limited. Finally, we present a light-weight cryptographic implementation of the contracts to mitigate the double moral hazard problem between the principal and the agents.
引用
收藏
页码:79 / 98
页数:20
相关论文
共 50 条
  • [21] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [22] Privacy-preserving face recognition with outsourced computation
    Xiang, Can
    Tang, Chunming
    Cai, Yunlu
    Xu, Qiuxia
    SOFT COMPUTING, 2016, 20 (09) : 3735 - 3744
  • [23] New verifiable outsourced computation scheme for an arbitrary function
    Xiang, Can
    Tang, Chunming
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (03) : 190 - 199
  • [24] Online/Offline Rewritable Blockchain With Auditable Outsourced Computation
    Guo, Lifeng
    Wang, Qianli
    Yau, Wei-Chuen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 499 - 514
  • [25] A Comprehensive Survey on Secure Outsourced Computation and Its Applications
    Yang, Yang
    Huang, Xindi
    Liu, Ximeng
    Cheng, Hongju
    Weng, Jian
    Luo, Xiangyang
    Chang, Victor
    IEEE ACCESS, 2019, 7 : 159426 - 159465
  • [26] Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix
    Hu, Xing
    Tang, Chunming
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4 (01):
  • [27] Distributed Access Control with Outsourced Computation in Fog Computing
    Wang, Qihua
    Lv, Gaoyan
    Sun, Xiuling
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 2446 - 2450
  • [28] Secure Outsourced Bilinear Pairings Computation for Mobile Devices
    Hyla, Tomasz
    Pejas, Jerzy
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 519 - 529
  • [29] A Distributed Access Control with Outsourced Computation in Fog Computing
    Wang, Qihua
    Wang, Huaqun
    Wang, Yufeng
    Guo, Rui
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [30] Privacy-preserving face recognition with outsourced computation
    Can Xiang
    Chunming Tang
    Yunlu Cai
    Qiuxia Xu
    Soft Computing, 2016, 20 : 3735 - 3744