Skip to main content

Verifiable Computing for Specific Applications

  • Chapter
  • First Online:
Privately and Publicly Verifiable Computing Techniques

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 813 Accesses

Abstract

Beyond the families of schemes we have seen so far, there exist verifiable computing schemes for specific functions, which we present here. More precisely, “From Secrecy to Soundness: Efficient Verification via Secure Computation” by Applebaum et al. allows the computation of arithmetic branching programs, “Signatures of Correct Computation” by Papamanthou et al. allows to compute multivariate polynomials of fixed degree and derivations of multivariate polynomials, “Efficient Techniques for Publicly Verifiable Delegation of Computation” by Elkhiyaoui et al. allows the verification of matrix vector multiplications and univariate polynomials, “Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions” by Zhang et al. provides verification for the inversion of a class of functions, “Secure Delegation of Elliptic-Curve Pairing” by Chevallier-Mames et al. allows to verifiably compute cryptographic bilinear maps, “Efficiently Verifiable Computation on Encrypted Data” by Fiore et al. presents a way to verify univariate polynomial evaluations over encrypted data, “TrueSet: Nearly Practical Verifiable Set Computations” by Kosba et al. allows to verify set operations, “Verifiable Delegation of Computation over Large Datasets” by Benabbas et al. addresses verifiable computing schemes for multivariate polynomials of fixed degree, and “Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations” by Sun et al. provides a batch verifiable computation scheme for multiple functions evaluated on a fixed input.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Applebaum, Randomly encoding functions: a new cryptographic paradigm - (invited talk), in Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings, Amsterdam, 21–24 May 2011, pp. 25–31

    Google Scholar 

  2. B. Applebaum, Y. Ishai, E. Kushilevitz, From secrecy to soundness: efficient verification via secure computation, in Automata, Languages and Programming, 37th International Colloquium, ICALP 2010, Proceedings, Part I, Bordeaux, 6–10 July 2010, pp. 152–163

    Google Scholar 

  3. A. Beimel, A. Gál, On arithmetic branching programs. J. Comput. Syst. Sci. 59, 195–220 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  4. Z. Brakerski, C. Gentry, V. Vaikuntanathan, Fully homomorphic encryption without bootstrapping. Electron. Colloq. Comput. Complex. 18, 111 (2011)

    MATH  Google Scholar 

  5. R. Canetti, B. Riva, G.N. Rothblum, Two protocols for delegation of computation, in Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings, Montreal, QC, 15–17 August 2012, pp. 37–61

    Google Scholar 

  6. X. Chen, W. Susilo, J. Li, D.S. Wong, J. Ma, S. Tang, Q. Tang, Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562, 112–121 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  7. B. Chevallier-Mames, J. Coron, N. McCullagh, D. Naccache, M. Scott, Secure delegation of elliptic-curve pairing, in Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Proceedings, Passau, 14–16 April 2010, pp. 24–35

    Google Scholar 

  8. K. Elkhiyaoui, M. Önen, M. Azraoui, R. Molva, Efficient techniques for publicly verifiable delegation of computation, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, 30 May–3 June 2016, pp. 119–128

    Google Scholar 

  9. D. Fiore, R. Gennaro, V. Pastro, Efficiently verifiable computation on encrypted data, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, 3–7 November 2014, pp. 844–855

    Google Scholar 

  10. R. Gennaro, C. Gentry, B. Parno, M. Raykova, Quadratic span programs and succinct NIZKs without PCPs, in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Athens, 26–30 May 2013, pp. 626–645

    Google Scholar 

  11. A.E. Kosba, D. Papadopoulos, C. Papamanthou, M.F. Sayed, E. Shi, N. Triandopoulos, TRUESET: faster verifiable set computations, in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, 20–22 August 2014, pp. 765–780

    Google Scholar 

  12. C. Papamanthou, E. Shi, R. Tamassia, Signatures of correct computation, in TCC (2013), pp. 222–242

    Google Scholar 

  13. Y. Sun, Y. Yu, X. Li, K. Zhang, H. Qian, Y. Zhou, Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations, in Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings, Part I, Melbourne, VIC, 4–6 July 2016, pp. 293–309

    Google Scholar 

  14. F. Zhang, X. Ma, S. Liu, Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286, 19–28 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  15. L.F. Zhang, R. Safavi-Naini, X.W. Liu, Verifiable local computation on distributed data, in Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS ’14, Kyoto, 3 June 2014, pp. 3–10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Demirel, D., Schabhüser, L., Buchmann, J. (2017). Verifiable Computing for Specific Applications. In: Privately and Publicly Verifiable Computing Techniques. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-53798-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53798-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53797-9

  • Online ISBN: 978-3-319-53798-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics