TY - JOUR
T1 - 函数隐私保护的批量可验证边缘计算方案
AU - Chen, Ying
AU - Zhou, Jun
AU - Dong, Xiao Lei
AU - Cao, Zhen Fu
N1 - Publisher Copyright:
© 2025, Chinese Association for Cryptologic Research. All rights reserved.
PY - 2025/11/7
Y1 - 2025/11/7
N2 - Edge computing, a new distributed computing paradigm consists of multiple edge nodes between cloud servers and local users cooperating to perform outsourced storage and computation tasks. Nevertheless, in untrustworthy environments, edge nodes can destroy user data privacy and outsourced functions, disrupt the correct execution of protocols through arbitrary behaviors, and return incorrect computation results. Currently, the correctness verification schemes of edge computation results with data privacy and function privacy protection are mainly realized by bilinear pairing or aggregated signature techniques, which have huge computational and communication overheads and cannot simultaneously meet the batch verifiability requirements of multi-user, multi-input, and multi-function. To solve the above problems, this study proposes a lightweight batch-verifiable edge computing scheme to realize efficient batch private and public verification of computation results returned by edge nodes. Specifically, in the setting of multiple users, multiple inputs, and multiple computational tasks, it splits the shares of both data and evaluated functions by exploiting the finite set theory called uniform (k, n)-set. The proposed scheme makes the verification overhead only linear to both the number and the degree of the evaluated functions, much smaller than the edge computing overhead while protecting input privacy and function privacy.
AB - Edge computing, a new distributed computing paradigm consists of multiple edge nodes between cloud servers and local users cooperating to perform outsourced storage and computation tasks. Nevertheless, in untrustworthy environments, edge nodes can destroy user data privacy and outsourced functions, disrupt the correct execution of protocols through arbitrary behaviors, and return incorrect computation results. Currently, the correctness verification schemes of edge computation results with data privacy and function privacy protection are mainly realized by bilinear pairing or aggregated signature techniques, which have huge computational and communication overheads and cannot simultaneously meet the batch verifiability requirements of multi-user, multi-input, and multi-function. To solve the above problems, this study proposes a lightweight batch-verifiable edge computing scheme to realize efficient batch private and public verification of computation results returned by edge nodes. Specifically, in the setting of multiple users, multiple inputs, and multiple computational tasks, it splits the shares of both data and evaluated functions by exploiting the finite set theory called uniform (k, n)-set. The proposed scheme makes the verification overhead only linear to both the number and the degree of the evaluated functions, much smaller than the edge computing overhead while protecting input privacy and function privacy.
KW - batch verification
KW - edge computing
KW - privacy-preserving
KW - verifiable computation
UR - https://www.scopus.com/pages/publications/105023500776
U2 - 10.13868/j.cnki.jcr.000813
DO - 10.13868/j.cnki.jcr.000813
M3 - 文章
AN - SCOPUS:105023500776
SN - 2095-7025
VL - 12
SP - 1061
EP - 1080
JO - Journal of Cryptologic Research
JF - Journal of Cryptologic Research
IS - 5
ER -