Title :
EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function
Author :
Zhou, Jun ; Cao, Zhenfu ; Dong, Xiaolei ; Lin, Xiaodong
Author_Institution :
Shanghai Key Lab for Trustworthy Computing, East China Normal University, 200062, China
Abstract :
Verifiable outsourced computation enables a computational resource-constrained mobile device to outsource the computation of a function F on multiple inputs x1, …, xn to the cloud that is generally assumed to possess abundant powers. The most existing work depends on Yao´s Garbled Circuit and fully homomorphic encryptions that took considerable computational overhead on weak clients. In this paper, a more efficient verifiable outsourced computation of encrypted data EVOC supporting any functions from any one-way trapdoor function is proposed, based on our newly-devised privacy preserving data aggregation supporting both addition and multiplication operations without exploiting fully homomorphic encryption (FHE). It solves the open problem suggested by Gennaro et al. that how to devise a verifiable computation scheme that used a more efficient primitive than FHE. Finally, the formal security proof and extensive efficiency evaluations demonstrate our proposed EVOC satisfies the target security and privacy requirements and far outperforms the state-of-the-art in terms of computational and communication complexity.
Keywords :
Cryptography; Data privacy; Privacy; Random access memory; Receivers; Wires;
Conference_Titel :
Communications (ICC), 2015 IEEE International Conference on
Conference_Location :
London, United Kingdom
DOI :
10.1109/ICC.2015.7249516