Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication

With the development of cloud services, outsourcing computation tasks to a commercial cloud server has drawn attention of various communities, especially in the Big Data era. Public verifiability offers a flexible functionality in real circumstance where the cloud service provider (CSP) may be untrusted or some malicious users may slander the CSP on purpose. However, sometimes the computational result is sensitive and is supposed to remain undisclosed in the public verification phase, while existing works on publicly verifiable computation (PVC) fail to achieve this requirement. In this paper, we highlight the property of result confidentiality in publicly verifiable computation and present confidentiality-preserving public verifiable computation (CP-PVC) schemes for multivariate polynomial evaluation and matrix-vector multiplication, respectively. The proposed schemes work efficiently under the amortized model and, compared with previous PVC schemes for these computations, achieve confidentiality of computational results, while maintaining the property of public verifiability. The proposed schemes proved to be secure, efficient, and result-confidential. In addition, we provide the algorithms and experimental simulation to show the performance of the proposed schemes, which indicates that our proposal is also acceptable in practice.

[1]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[2]  Dan Boneh,et al.  A Secure Signature Scheme from Bilinear Maps , 2003, CT-RSA.

[3]  Yuan Zhou,et al.  Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations , 2016, ACISP.

[4]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.

[5]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[6]  Cong Wang,et al.  Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.

[7]  Refik Molva,et al.  Efficient Techniques for Publicly Verifiable Delegation of Computation , 2016, AsiaCCS.

[8]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[9]  Jason Crampton,et al.  Publicly Verifiable Outsourced Computation with a Key Distribution Centre , 2014, ArXiv.

[10]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[11]  Jason Crampton,et al.  Hybrid Publicly Verifiable Computation , 2016, CT-RSA.

[12]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[13]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[14]  Rosario Gennaro,et al.  Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.

[15]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[16]  Haiyan Zhang,et al.  Verifiable Delegation of Polynomials , 2016, Int. J. Netw. Secur..

[17]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[18]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[20]  Jason Crampton,et al.  Revocation in Publicly Verifiable Outsourced Computation , 2014, Inscrypt.

[21]  Robert H. Deng,et al.  Verifiable Computation on Outsourced Encrypted Data , 2014, ESORICS.

[22]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[23]  Reihaneh Safavi-Naini,et al.  Batch verifiable computation of outsourced functions , 2015, Des. Codes Cryptogr..

[24]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[25]  Elaine Shi,et al.  Signatures of Correct Computation , 2013, TCC.

[26]  Rafail Ostrovsky,et al.  Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing , 2014, Public Key Cryptography.

[27]  Jiankun Hu,et al.  Confidentiality-Preserving Publicly Verifiable Computation , 2017, Int. J. Found. Comput. Sci..