DocumentCode :
652234
Title :
Public Verification of Outsourced Computation of Polynomial Functions
Author :
Peili Li ; Haixia Xu ; Shu Guo
Author_Institution :
State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
776
Lastpage :
780
Abstract :
We study the issues of outsourced computation in which a computationally weak client outsources its work to a computationally strong worker. Since the worker may not be trusted, the verification of the correctness of outsourced computation gets more attention. This paper focuses on the public verification model where the computation result can be verified by any other client using the public verification key. Fiore and Gennaro provided a public outsourced computation scheme for polynomial functions. It is efficient and offer security, however it doesn´t keep privacy of the outsourced data. Using the idea of fully homomorphic message authenticators proposed by Gennaro and Wichs, we propose a verification scheme for outsourced computation of polynomial functions. It is in the public verification model and achieves keeping privacy of the outsourced data.
Keywords :
authorisation; data privacy; outsourcing; polynomials; computationally strong worker; computationally weak client outsources; fully homomorphic message authenticators; outsourced data privacy; polynomial functions; public outsourced computation scheme; public verification key; Computational modeling; Cryptography; Data privacy; Polynomials; Privacy; Protocols; correctness; outsourced computation; privacy; public; verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.94
Filename :
6680914
Link To Document :
بازگشت