TY - GEN
T1 - Hybrid Publicly Verifiable Computation
AU - Alderman, James
AU - Janson, Christian
AU - Crampton, Jason
AU - Cid, Carlos
PY - 2016/2/2
Y1 - 2016/2/2
N2 - Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results. Delegation and verification rely only on public parameters, and thus PVC lends itself to large multi-user systems where entities need not be registered. In such settings, individual user requirements may be diverse and cannot be realised with current PVC solutions. In this paper, we introduce Hybrid PVC (HPVC) which, with a single setup stage, provides a flexible solution to outsourced computation supporting multiple modes: (i) standard PVC, (ii) PVC with cryptographically enforced access control policies restricting the servers that may perform a given computation, and (iii) a reversed model of PVC which we call Verifiable Delegable Computation (VDC) where data is held remotely by servers. Entities may dynamically play the role of delegators or servers as required.
AB - Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results. Delegation and verification rely only on public parameters, and thus PVC lends itself to large multi-user systems where entities need not be registered. In such settings, individual user requirements may be diverse and cannot be realised with current PVC solutions. In this paper, we introduce Hybrid PVC (HPVC) which, with a single setup stage, provides a flexible solution to outsourced computation supporting multiple modes: (i) standard PVC, (ii) PVC with cryptographically enforced access control policies restricting the servers that may perform a given computation, and (iii) a reversed model of PVC which we call Verifiable Delegable Computation (VDC) where data is held remotely by servers. Entities may dynamically play the role of delegators or servers as required.
U2 - 10.1007/978-3-319-29485-8_9
DO - 10.1007/978-3-319-29485-8_9
M3 - Conference contribution
SN - 978-3-319-29484-1
VL - 9610
T3 - Lecture Notes in Computer Science
SP - 147
EP - 163
BT - Topics in Cryptology - CT-RSA 2016
A2 - Sako, Kazue
PB - Springer
ER -