Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Scopus citations

Abstract

In a verifiable computation (VC) scheme, a client asks a server to perform some outsourced computations, and the latter returns the results as its response. The results can be verified privately or publicly. Fiore and Gennaro (CCS 2012) constructed publicly verifiable protocols for secure outsourcing polynomials andmatrix computations. Batch verifiable computation (BVC) schemes allow a client to outsource multiple functions on a same input, and thus much reduce the storage overhead at the server side without sacrificing the efficiency of verification. However, existing BVC schemes only support private verifiability (which only allows the client who outsources the computations to verify the results). In this paper, we propose BVC schemes with public verifiability, i.e., any third party can efficiently verify the results returned by the server without accessing secret key. To delegate s functions, our BVC schemes require a cloud storage of only 1 + 1/s times the storage size needed by the s functions themselves. We extend our schemes to meet less cloud storage overhead as well.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
EditorsJoseph K. Liu, Ron Steinfeld
PublisherSpringer Verlag
Pages293-309
Number of pages17
ISBN (Print)9783319402529
DOIs
StatePublished - 2016
Event21st Australasian Conference on Information Security and Privacy, ACISP 2016 - Melbourne, Australia
Duration: 4 Jul 20166 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9722
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st Australasian Conference on Information Security and Privacy, ACISP 2016
Country/TerritoryAustralia
CityMelbourne
Period4/07/166/07/16

Keywords

  • Batch verifiable computation
  • Pseudorandom function
  • Public verifiability
  • Storage overhead

Fingerprint

Dive into the research topics of 'Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations'. Together they form a unique fingerprint.

Cite this