Optimal Contracts for Outsourced Computation

被引:0
|
作者
Viet Pham [1 ]
Khouzani, M. H. R. [1 ]
Cid, Carlos [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., "lazy-but-honest" contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and "redundancy". Our contracts provably minimize the expense of the outsourcer (principal) while guaranteeing correct computation. Furthermore, we incorporate practical restrictions of the maximum enforceable fine, limited and/or costly auditing, and bounded budget of the outsourcer. By examining the optimal contracts, we provide insights on how resources should be utilized when auditing capacity and enforceability are limited. Finally, we present a light-weight cryptographic implementation of the contracts to mitigate the double moral hazard problem between the principal and the agents.
引用
收藏
页码:79 / 98
页数:20
相关论文
共 50 条
  • [31] Efficient RAM and Control Flow in Verifiable Outsourced Computation
    Wahby, Riad S.
    Setty, Srinath
    Ren, Zuocheng
    Blumberg, Andrew J.
    Walfish, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [32] Secure Outsourced Matrix Computation and Application to Neural Networks
    Jiang, Xiaoqian
    Kim, Miran
    Lauter, Kristin
    Song, Yongsoo
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1209 - 1222
  • [33] A Survey of Homomorphic Encryption for Outsourced Big Data Computation
    Fun, Tan Soo
    Samsudin, Azman
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (08): : 3826 - 3851
  • [34] Secure Outsourced Computation in Connected Vehicular Cloud Computing
    Shao, Jun
    Wei, Guiyi
    IEEE NETWORK, 2018, 32 (03): : 36 - 41
  • [35] Dynamic anomaly detection for more trustworthy outsourced computation
    Alsouri, Sami
    Sinschek, Jan
    Sewe, Andreas
    Bodden, Eric
    Mezini, Mira
    Katzenbeisser, Stefan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7483 LNCS : 168 - 187
  • [36] Optimal lending contracts
    At, Christian
    Thomas, Lionel
    OXFORD ECONOMIC PAPERS-NEW SERIES, 2017, 69 (01): : 263 - 277
  • [37] OPTIMAL INDEMNITY CONTRACTS
    BLAZENKO, G
    INSURANCE MATHEMATICS & ECONOMICS, 1985, 4 (04): : 267 - 278
  • [38] Optimal Collateralized Contracts
    Cao, Dan
    Lagunoff, Roger
    AMERICAN ECONOMIC JOURNAL-MICROECONOMICS, 2020, 12 (04) : 45 - 74
  • [39] Optimal Contracts for Experimentation
    Halac, Marina
    Kartik, Navin
    Liu, Qingmin
    REVIEW OF ECONOMIC STUDIES, 2016, 83 (03): : 1040 - 1091
  • [40] OPTIMAL MARRIAGE CONTRACTS
    BROWN, M
    JOURNAL OF HUMAN RESOURCES, 1992, 27 (03) : 534 - 550