2011
DOI: 10.1007/978-3-642-22792-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Delegation of Computation over Large Datasets

Abstract: We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry, and Parno in CRYPTO 2010. We present the first practical verifiable computation scheme for high degree polynomial functions. Such functions can be used, for example, to make predictions based on polynomials fitted to a large number of sample points in an experiment. In addition to the many non-cryptographic applications of delegati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
282
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 269 publications
(286 citation statements)
references
References 60 publications
0
282
0
Order By: Relevance
“…A substantial body of theoretical work in this area has focused on the development of protocols targeted at specific problems (e.g. [15,19,51]). Other theoretical works have focused on the development of general-purpose argument systems.…”
Section: Related Workmentioning
confidence: 99%
“…A substantial body of theoretical work in this area has focused on the development of protocols targeted at specific problems (e.g. [15,19,51]). Other theoretical works have focused on the development of general-purpose argument systems.…”
Section: Related Workmentioning
confidence: 99%
“…Verifiable computation for polynomials. Benabbas et al [3] developed methods for efficient verification of multivariate polynomial evaluation by using algebraic one-way functions-however, in the SVC model. This work does not achieve efficient updates of polynomial coefficients (specifically, in order to update a coefficient, one has to re-randomize all the existing coefficients).…”
Section: Related Workmentioning
confidence: 99%
“…Moreover several useful constructions are also enabled by verifying polynomial operations, such as accumulators [30], verifiable set operations [33], verifiable databases [3] and proofs of retrievability [3]. Although applications of polynomial evaluation are more straightforward, one might wonder what is the meaning of a derivative in Z p and why its verification can be of any use.…”
Section: F Applicationsmentioning
confidence: 99%
“…Other related works such as verifiable computation [2,5,15,16,17,18,34,40] and authenticated data structures [13,20,21,31,35,36,37,38] are not directly applicable to the streaming setting or their application yields high complexities or interactive protocols.…”
Section: Related Workmentioning
confidence: 99%