Verifiable Computation of Large Polynomials

被引:0
|
作者
Hong, Jiaqi [1 ,2 ,3 ]
Xu, Haixia [1 ,2 ]
Li, Peili [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informassurance, Beijing, Peoples R China
[2] Chinese Acad Sci, Commun Secur Res Ctr, Beijing, Peoples R China
[3] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
来源
关键词
Verifiable computation; Amortized; Pre-computation; Public verification; MULTILINEAR MAPS; DELEGATION;
D O I
10.1007/978-3-319-27998-5_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the proliferation of powerful cloud service, verifiable computation, which makes a computationally weak client perform intensive computations possible through outsourcing tasks to a powerful server, is attracting increasing attention. The correctness of the returned result should be verified as the server may be not trusted. In this paper, we present a verifiable computation protocol on large polynomials, which can be publicly verified by any parties in the network. Compared with verifiable computation protocol presented by Backes et al., which is on quadratic, multi-variable polynomials, our verifiable computation protocol is on high degree, multi-variable polynomials and publicly verifiable.
引用
收藏
页码:90 / 104
页数:15
相关论文
共 50 条
  • [1] Batch Verifiable Computation of Polynomials on Outsourced Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 167 - 185
  • [2] A Confidentiality Preserving Publicly Verifiable Computation for Multivariate Polynomials
    Sun Jiameng
    Zhu Binrui
    Jing, Qin
    Ma Jixin
    [J]. 2017 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2017, : 5 - 12
  • [3] Verifiable Delegation of Computation over Large Datasets
    Benabbas, Siavosh
    Gennaro, Rosario
    Vahlis, Yevgeniy
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 111 - 131
  • [4] Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources
    Song, Wei
    Wang, Bing
    Wang, Qian
    Shi, Chengliang
    Lou, Wenjing
    Peng, Zhiyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2334 - 2347
  • [5] Multi-Server Verifiable Computation of Low-Degree Polynomials
    Zhang, Liang Feng
    Wang, Huaxiong
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 596 - 613
  • [6] Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations
    Sun, Yujuan
    Yu, Yu
    Li, Xiangxue
    Zhang, Kai
    Qian, Haifeng
    Zhou, Yuan
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 293 - 309
  • [7] Verifiable Computation over Large Database with Incremental Updates
    Chen, Xiaofeng
    Li, Jin
    Weng, Jian
    Ma, Jianfeng
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 3184 - 3195
  • [8] Verifiable Computation over Large Database with Incremental Updates
    Chen, Xiaofeng
    Li, Jin
    Weng, Jian
    Ma, Jianfeng
    Lou, Wenjing
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 148 - 162
  • [9] Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"
    Wang, Xu An
    Choo, Kim-Kwang Raymond
    Weng, Jian
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1586 - 1588
  • [10] A Survey of Verifiable Computation
    Yu, Xixun
    Yan, Zheng
    Vasilakos, Athanasios V.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03): : 438 - 453