Abstract
Beyond the families of schemes we have seen so far, there exist verifiable computing schemes for specific functions, which we present here. More precisely, “From Secrecy to Soundness: Efficient Verification via Secure Computation” by Applebaum et al. allows the computation of arithmetic branching programs, “Signatures of Correct Computation” by Papamanthou et al. allows to compute multivariate polynomials of fixed degree and derivations of multivariate polynomials, “Efficient Techniques for Publicly Verifiable Delegation of Computation” by Elkhiyaoui et al. allows the verification of matrix vector multiplications and univariate polynomials, “Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions” by Zhang et al. provides verification for the inversion of a class of functions, “Secure Delegation of Elliptic-Curve Pairing” by Chevallier-Mames et al. allows to verifiably compute cryptographic bilinear maps, “Efficiently Verifiable Computation on Encrypted Data” by Fiore et al. presents a way to verify univariate polynomial evaluations over encrypted data, “TrueSet: Nearly Practical Verifiable Set Computations” by Kosba et al. allows to verify set operations, “Verifiable Delegation of Computation over Large Datasets” by Benabbas et al. addresses verifiable computing schemes for multivariate polynomials of fixed degree, and “Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations” by Sun et al. provides a batch verifiable computation scheme for multiple functions evaluated on a fixed input.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Applebaum, Randomly encoding functions: a new cryptographic paradigm - (invited talk), in Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings, Amsterdam, 21–24 May 2011, pp. 25–31
B. Applebaum, Y. Ishai, E. Kushilevitz, From secrecy to soundness: efficient verification via secure computation, in Automata, Languages and Programming, 37th International Colloquium, ICALP 2010, Proceedings, Part I, Bordeaux, 6–10 July 2010, pp. 152–163
A. Beimel, A. Gál, On arithmetic branching programs. J. Comput. Syst. Sci. 59, 195–220 (1999)
Z. Brakerski, C. Gentry, V. Vaikuntanathan, Fully homomorphic encryption without bootstrapping. Electron. Colloq. Comput. Complex. 18, 111 (2011)
R. Canetti, B. Riva, G.N. Rothblum, Two protocols for delegation of computation, in Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings, Montreal, QC, 15–17 August 2012, pp. 37–61
X. Chen, W. Susilo, J. Li, D.S. Wong, J. Ma, S. Tang, Q. Tang, Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562, 112–121 (2015)
B. Chevallier-Mames, J. Coron, N. McCullagh, D. Naccache, M. Scott, Secure delegation of elliptic-curve pairing, in Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Proceedings, Passau, 14–16 April 2010, pp. 24–35
K. Elkhiyaoui, M. Önen, M. Azraoui, R. Molva, Efficient techniques for publicly verifiable delegation of computation, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, 30 May–3 June 2016, pp. 119–128
D. Fiore, R. Gennaro, V. Pastro, Efficiently verifiable computation on encrypted data, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, 3–7 November 2014, pp. 844–855
R. Gennaro, C. Gentry, B. Parno, M. Raykova, Quadratic span programs and succinct NIZKs without PCPs, in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Athens, 26–30 May 2013, pp. 626–645
A.E. Kosba, D. Papadopoulos, C. Papamanthou, M.F. Sayed, E. Shi, N. Triandopoulos, TRUESET: faster verifiable set computations, in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, 20–22 August 2014, pp. 765–780
C. Papamanthou, E. Shi, R. Tamassia, Signatures of correct computation, in TCC (2013), pp. 222–242
Y. Sun, Y. Yu, X. Li, K. Zhang, H. Qian, Y. Zhou, Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations, in Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings, Part I, Melbourne, VIC, 4–6 July 2016, pp. 293–309
F. Zhang, X. Ma, S. Liu, Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286, 19–28 (2014)
L.F. Zhang, R. Safavi-Naini, X.W. Liu, Verifiable local computation on distributed data, in Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS ’14, Kyoto, 3 June 2014, pp. 3–10
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Demirel, D., Schabhüser, L., Buchmann, J. (2017). Verifiable Computing for Specific Applications. In: Privately and Publicly Verifiable Computing Techniques. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-53798-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-53798-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53797-9
Online ISBN: 978-3-319-53798-6
eBook Packages: Computer ScienceComputer Science (R0)