In this chapter we discuss approaches to verifiable computing that use fully homomorphic encryption (FHE) as a building block. First, we define homomorphic encryption and fully homomorphic encryption. Then, we describe the verifiable computing schemes using this primitive, i.e. “Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers” by Gennaro et al., “Improved Delegation of Computation Using Fully Homomorphic Encryption” by Chung et al., and “Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions” by Chen et al. Note that using these solutions the client encrypts the data before it outsources it to the server. Thus, these solutions achieve input privacy. In addition, only the client can decrypt the result, which is why also output privacy is assured. However, on the downside all fully homomorphic encryption based schemes are only privately verifiable. Furthermore, all solutions are only secure against weak adversaries and providing efficient FHE schemes is still an open research challenge.
[1]
Chunming Tang,et al.
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
,
2014,
IACR Cryptol. ePrint Arch..
[2]
Andrew Chi-Chih Yao,et al.
How to generate and exchange secrets
,
1986,
27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[3]
Andrew Chi-Chih Yao,et al.
Protocols for Secure Computations (Extended Abstract)
,
1982,
FOCS.
[4]
Craig Gentry,et al.
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
,
2010,
CRYPTO.
[5]
Yael Tauman Kalai,et al.
Improved Delegation of Computation using Fully Homomorphic Encryption
,
2010,
IACR Cryptol. ePrint Arch..
[6]
Frederik Armknecht,et al.
A Guide to Fully Homomorphic Encryption
,
2015,
IACR Cryptol. ePrint Arch..