Efficient proof composition for verifiable computation

Keuffer, Julien; Molva, Refi k; Chabanne, Hervé
ESORICS 2018, European Symposium on Research in Computer Security, 3-7 September 2018, Barcelona, Spain / Also Part of LNCS, Vol.11098

Outsourcing machine learning algorithms helps users to deal with large amounts of data without the need to develop the expertise required by these algorithms. Outsourcing however raises severe security issues due to potentially untrusted service providers. Veri able computing (VC) tackles some of these issues by assuring computational integrity for an outsourced computation. In this paper, we design a VC protocol tailored to verify a sequence of operations for which no existing VC scheme is suitable to achieve realistic performance objective for the entire sequence. We thus suggest a technique to compose several specialized and efficient VC schemes with a general purpose VC protocol, like Parno et al.'s Pinocchio, by integrating the veri cation of the proofs generated by these specialized schemes as a function that is part of the sequence of operations veri ed using the general purpose scheme. The resulting scheme achieves the objectives of the general purpose scheme with increased efficiency for the prover. The scheme relies on the underlying cryptographic assumptions of the composed protocols for correctness and soundness.

DOI
Type:
Conference
City:
Barcelona
Date:
2018-09-03
Department:
Digital Security
Eurecom Ref:
5606
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in ESORICS 2018, European Symposium on Research in Computer Security, 3-7 September 2018, Barcelona, Spain / Also Part of LNCS, Vol.11098 and is available at : http://doi.org/10.1007/978-3-319-99073-6_8

PERMALINK : https://www.eurecom.fr/publication/5606