Title :
Verifiable Evaluation of Private Polynomials
Author :
Xu Ma ; Fangguo Zhang ; Jin Li
Author_Institution :
Sch. of Inf. Sci. & Technol., Sun Yat-sen Univ., Guangzhou, China
Abstract :
Polynomial evaluation is an important tool in constructing many cryptographic protocols, such as proof of retrievability and verifiable keyword search. However, for the high degree polynomials derived from very large datasets, polynomial evaluation becomes an intractable problem, especially for resource limited devices. In this paper, we firstly propose practically efficient verifiable evaluation of private polynomial schemes without utilizing homomorphic encryption. We propose a novel method to blind the original polynomial and deblind the result returned from the server. To obtain and verify the correctness of the final evaluation of the polynomial, the user only needs to solve a linear congruence equation problem using Chinese Remainder Theorem(CRT). Extensive analysis shows that our schemes are secure in the proposed security model, that is, they satisfy the security requirements of verifiability, function privacy, and output privacy.
Keywords :
client-server systems; computer network security; cryptographic protocols; data privacy; number theory; CRT; Chinese remainder theorem; cryptographic protocols; deblinding; function privacy; high-degree polynomials; linear congruence equation problem; output privacy; polynomial blinding; retrievability; security model; verifiable keyword search; verifiable private polynomial evaluation; very-large datasets; Computational modeling; Polynomials; Privacy; Protocols; Security; Servers; Chinese Remainder Theorem; polynomial evaluation; privacy; verifiable computation;
Conference_Titel :
Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-4799-2140-9
DOI :
10.1109/EIDWT.2013.82