DocumentCode
652234
Title
Public Verification of Outsourced Computation of Polynomial Functions
Author
Peili Li ; Haixia Xu ; Shu Guo
Author_Institution
State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
fYear
2013
fDate
16-18 July 2013
Firstpage
776
Lastpage
780
Abstract
We study the issues of outsourced computation in which a computationally weak client outsources its work to a computationally strong worker. Since the worker may not be trusted, the verification of the correctness of outsourced computation gets more attention. This paper focuses on the public verification model where the computation result can be verified by any other client using the public verification key. Fiore and Gennaro provided a public outsourced computation scheme for polynomial functions. It is efficient and offer security, however it doesn´t keep privacy of the outsourced data. Using the idea of fully homomorphic message authenticators proposed by Gennaro and Wichs, we propose a verification scheme for outsourced computation of polynomial functions. It is in the public verification model and achieves keeping privacy of the outsourced data.
Keywords
authorisation; data privacy; outsourcing; polynomials; computationally strong worker; computationally weak client outsources; fully homomorphic message authenticators; outsourced data privacy; polynomial functions; public outsourced computation scheme; public verification key; Computational modeling; Cryptography; Data privacy; Polynomials; Privacy; Protocols; correctness; outsourced computation; privacy; public; verification;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location
Melbourne, VIC
Type
conf
DOI
10.1109/TrustCom.2013.94
Filename
6680914
Link To Document