• DocumentCode
    652234
  • Title

    Public Verification of Outsourced Computation of Polynomial Functions

  • Author

    Peili Li ; Haixia Xu ; Shu Guo

  • Author_Institution
    State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    776
  • Lastpage
    780
  • Abstract
    We study the issues of outsourced computation in which a computationally weak client outsources its work to a computationally strong worker. Since the worker may not be trusted, the verification of the correctness of outsourced computation gets more attention. This paper focuses on the public verification model where the computation result can be verified by any other client using the public verification key. Fiore and Gennaro provided a public outsourced computation scheme for polynomial functions. It is efficient and offer security, however it doesn´t keep privacy of the outsourced data. Using the idea of fully homomorphic message authenticators proposed by Gennaro and Wichs, we propose a verification scheme for outsourced computation of polynomial functions. It is in the public verification model and achieves keeping privacy of the outsourced data.
  • Keywords
    authorisation; data privacy; outsourcing; polynomials; computationally strong worker; computationally weak client outsources; fully homomorphic message authenticators; outsourced data privacy; polynomial functions; public outsourced computation scheme; public verification key; Computational modeling; Cryptography; Data privacy; Polynomials; Privacy; Protocols; correctness; outsourced computation; privacy; public; verification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.94
  • Filename
    6680914