Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting

With the advent of the big data era, the amount of data computation is getting larger and larger, and the computational load of clients is also increasing day by day. The advent of clouds allows clients to outsource their data to the cloud for computing services. Outsourced computation has greatly reduced the computational burden of clients, but also brings the issue of trust. Because the cloud is not trustworthy, clients need to verify the correctness of the remote computation results. In this paper, we mainly study the common norm operations, and propose two publicly verifiable schemes for 1-norm and 2-norm operations respectively, any client can publicly verify these two common norm operations under single-key setting by using our schemes.

[1]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[2]  Yiwei Thomas Hou,et al.  Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[3]  Stavros Papadopoulos,et al.  Lightweight authentication of linear algebraic queries on data streams , 2013, SIGMOD '13.

[4]  Graham Cormode,et al.  Practical verified computation with streaming interactive proofs , 2011, ITCS '12.

[5]  Srinath T. V. Setty,et al.  A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[7]  Wenjing Lou,et al.  Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys , 2017, IEEE Transactions on Services Computing.

[8]  Elaine Shi,et al.  Multi-Client Verifiable Computation with Stronger Security Guarantees , 2015, TCC.

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Suman Nath,et al.  Publicly verifiable grouped aggregation queries on outsourced data streams , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[12]  Rosario Gennaro,et al.  Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..