We consider an outsourced computation model in the selective data sharing setting. Specifically, one of the data owners outsources the encrypted data to an untrusted cloud server, and wants to share the specific function of these data with a group of data users. A data user can perform the specific computation on the data that it is authorized to access. We propose a construction under this model for the inner product computation by using the Inner Product Functional Encryption (IPFE) as a building block. A standard IPFE used on this model has two privacy weaknesses regarding the master secret key and the encrypted vector. We propose a strengthened IPFE that revises these weaknesses. We construct a new IPFE scheme and use it to construct an efficient outsourced inner product computation scheme. In our outsourced computation scheme, the storage overhead and the computation cost for a data user are independent of the vector size. The result privacy and the outsourced data privacy are well preserved against the untrusted cloud server. The experimental results show that our schemes are efficient and practical.
With the wide deployment of cloud computing, outsourcing complicated computational tasks to cloud service providers has attracted much attention. An increasing number of clients with computationally constrained devices choose to outsource their heavy tasks to cloud servers to reduce the computational overhead in local. However, how to preserve the integrity of computational results becomes a challenge since commercial cloud servers are not trusted. Public verifiability is an effective mechanism to allow clients to verify the integrity of the results returned by the servers. Because the results are sensitive in many applications, it raises the problem of privacy leakage in the public verification process. In this paper, we propose an efficient verifiable computation scheme while keeping output privacy. The proposed scheme achieves blind verifiability such that the verifiers who have not the additional information (retrieve key) can verify the integrity of the result without learning the result. Furthermore, by combining with (k, n)-threshold sharing, our scheme allows the clients jointly learn the results. KEYWORDSblind verifiability, cloud computing, KP-ABE, verifiable computation INTRODUCTIONWith the rapid development of cloud technology, outsourced computation has been an important field. The technology provides not only the storage service but also the computing service, which can benefit the clients with limited resources a great deal. Meanwhile, the computationally constrained devices such as smartphones, laptops, and wearable equipments 1 have become popular. These scenarios contribute to the research of outsourced computation where the computationally weak clients (devices) outsource the expensive and complicated computation to the large and powerful servers. 2 In addition, outsourced computation is sometimes used to perform the complicated task in some cryptographic primitives 3-5 as well, which can make the primitives more efficient and practical. However, the servers are generally operated by the third-party outside the control domain of clients, and there may exist an incentive for servers to deceive clients into accepting an incorrect result. For instance, to save the computational resources, the cloud servers may not perform the advertised computation but instead return a computationally indistinguishable result to the client.In this case, the key problem is that the clients may not have enough computational resources to detect the incorrect result, which would bring trouble to clients in their subsequent works. For example, if the computational result is the statistics analysis for stock market, the incorrect result will cause the investment corporation property loss. Hence, clients need some efficient methodologies to guarantee that the returned result from servers is correct, which is a necessity in the outsourced computation paradigm.The design of verifiable outsourced computation has drawn widespread attentions. 2,6-9 In the verifiable computation scheme, the verifiability property allows the cl...
As cloud computing provides affordable and scalable computational resources, delegating heavy computing tasks to the cloud service providers is appealing to individuals and companies. Among different types of specific computations, the polynomial evaluation is an important one due to its wide usage in engineering and scientific fields. Cloud service providers may not be trusted, thus, the validity and the privacy of such computation should be guaranteed. In this article, the authors present a protocol for publicly verifiable delegations of high degree polynomials. Compared with the existing solutions, it ensures the privacy of outsourced functions and actual results. And the protocol satisfies the property of blind verifiability such that the results can be publicly verified without learning the value. The protocol also improves in efficiency.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.