Ecole d'ingénieur et centre de recherche en Sciences du numérique

Efficient techniques for publicly verifiable delegation of computation

Elkhiyaoui, Kaoutar; Önen, Melek; Azraoui, Monir; Molva, Refik

ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi'ian, China

With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage cloud resources not only for storage but also for computation. Nevertheless, the reliance on the cloud to perform computation raises the unavoidable challenge of how to assure the correctness of the delegated computation. In this regard, we introduce two cryptographic protocols for publicly verifiable computation that allow a lightweight client to securely outsource to a cloud server the evaluation of highdegree univariate polynomials and the multiplication of large matrices. Similarly to existing work, our protocols follow the amortized verifiable computation approach. Furthermore, by exploiting the mathematical properties of polynomials and matrices, they are more efficient and give way to public delegatability. Finally, besides their efficiency, our protocols are provably secure under wellstudied assumptions.

Document Doi Bibtex

Titre:Efficient techniques for publicly verifiable delegation of computation
Type:Conférence
Langue:English
Ville:Xi'ian
Pays:CHINE
Date:
Département:Sécurité numérique
Eurecom ref:4839
Copyright: © ACM, 2016. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi'ian, China http://dx.doi.org/10.1145/2897845.2897910
Bibtex: @inproceedings{EURECOM+4839, doi = {http://dx.doi.org/10.1145/2897845.2897910}, year = {2016}, title = {{E}fficient techniques for publicly verifiable delegation of computation}, author = {{E}lkhiyaoui, {K}aoutar and {\"{O}}nen, {M}elek and {A}zraoui, {M}onir and {M}olva, {R}efik}, booktitle = {{ASIACCS} 2016, 11th {ACM} {A}sia {C}onference on {C}omputer and {C}ommunications {S}ecurity, {M}ay 30-{J}une 3, 2016, {X}i'ian, {C}hina}, address = {{X}i'ian, {CHINE}}, month = {05}, url = {http://www.eurecom.fr/publication/4839} }
Voir aussi: