Verifiable Computing for Specific Applications

Beyond the families of schemes we have seen so far, there exist verifiable computing schemes for specific functions, which we present here. More precisely, “From Secrecy to Soundness: Efficient Verification via Secure Computation” by Applebaum et al. allows the computation of arithmetic branching programs, “Signatures of Correct Computation” by Papamanthou et al. allows to compute multivariate polynomials of fixed degree and derivations of multivariate polynomials, “Efficient Techniques for Publicly Verifiable Delegation of Computation” by Elkhiyaoui et al. allows the verification of matrix vector multiplications and univariate polynomials, “Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions” by Zhang et al. provides verification for the inversion of a class of functions, “Secure Delegation of Elliptic-Curve Pairing” by Chevallier-Mames et al. allows to verifiably compute cryptographic bilinear maps, “Efficiently Verifiable Computation on Encrypted Data” by Fiore et al. presents a way to verify univariate polynomial evaluations over encrypted data, “TrueSet: Nearly Practical Verifiable Set Computations” by Kosba et al. allows to verify set operations, “Verifiable Delegation of Computation over Large Datasets” by Benabbas et al. addresses verifiable computing schemes for multivariate polynomials of fixed degree, and “Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations” by Sun et al. provides a batch verifiable computation scheme for multiple functions evaluated on a fixed input.

[1]  Jianfeng Ma,et al.  Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..

[2]  Craig Gentry,et al.  Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..

[3]  David Naccache,et al.  Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..

[4]  Craig Gentry,et al.  Fully Homomorphic Encryption without Bootstrapping , 2011, IACR Cryptol. ePrint Arch..

[5]  Yuval Ishai,et al.  From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.

[6]  Ran Canetti,et al.  Two Protocols for Delegation of Computation , 2012, ICITS.

[7]  Refik Molva,et al.  Efficient Techniques for Publicly Verifiable Delegation of Computation , 2016, AsiaCCS.

[8]  Elaine Shi,et al.  TRUESET: Faster Verifiable Set Computations , 2014, USENIX Security Symposium.

[9]  Rosario Gennaro,et al.  Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.

[10]  Elaine Shi,et al.  Signatures of Correct Computation , 2013, TCC.

[11]  Fangguo Zhang,et al.  Efficient computation outsourcing for inverting a class of homomorphic functions , 2014, Inf. Sci..

[12]  Benny Applebaum Randomly Encoding Functions: A New Cryptographic Paradigm - (Invited Talk) , 2011, ICITS.

[13]  Anna Gál,et al.  On Arithmetic Branching Programs , 1999, J. Comput. Syst. Sci..

[14]  Yuan Zhou,et al.  Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations , 2016, ACISP.

[15]  Reihaneh Safavi-Naini,et al.  Verifiable local computation on distributed data , 2014, SCC '14.