Verifiable Delegation of Polynomials

Verifiable computation allows a computationally weak client to outsource evaluation of a function on many inputs to a powerful but untrusted server. The client invests a large amount of offline computation in an amortized manner to obtain an encoding of its function which is then given to the server. The server returns both the evaluation result of the function on the client's input and a proof with which the client can verify the correctness of the evaluation using substantially less effort than doing the evaluation on its own from scratch. In this paper a verifiable delegation of polynomials is proposed based on the integer factorization problem. In the computation procedure, the computation polynomial and the verification polynomial are distinguishable, the wrong result and the result of other inputs will incur a validation failure. And last, the client can verify the result efficiently.

[1]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[2]  Elaine Shi,et al.  Signatures of Correct Computation , 2013, TCC.

[3]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[4]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[5]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Jin Li,et al.  Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing , 2015, Int. J. Netw. Secur..

[7]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[8]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[9]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[10]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[11]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[12]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[13]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[14]  Vinod Vaikuntanathan,et al.  How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..

[15]  Qiang Tang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[16]  Yael Tauman Kalai,et al.  Memory Delegation , 2011, CRYPTO.

[17]  Anna Lysyanskaya,et al.  How to Securely Outsource Cryptographic Computations , 2005, TCC.

[18]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[19]  Jonathan Katz,et al.  Multi-Client Non-interactive Verifiable Computation , 2013, TCC.