A4 Vertaisarvioitu artikkeli konferenssijulkaisussa
Verifiable Outsourcing of Computations Using Garbled Onions
Tekijät: Dönmez T.
Toimittaja: Sokratis K. Katsikas, Cristina Alcaraz
Konferenssin vakiintunut nimi: International Workshop on Security and Trust Management
Kustantaja: Springer Verlag
Julkaisuvuosi: 2018
Journal: Lecture Notes in Computer Science
Kokoomateoksen nimi: Security and Trust Management: 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings
Tietokannassa oleva lehden nimi: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Sarjan nimi: Lecture Notes in Computer Science
Vuosikerta: 11091
Aloitussivu: 122
Lopetussivu: 137
ISBN: 978-3-030-01140-6
eISBN: 978-3-030-01141-3
ISSN: 0302-9743
DOI: https://doi.org/10.1007/978-3-030-01141-3_8
Rinnakkaistallenteen osoite: https://research.utu.fi/converis/portal/detail/Publication/36539594
Solutions to the verifiable outsourcing problem based on Yao’s Garbled
Circuit (GC) construction have been investigated in previous works. A
major obstacle to the practicality of these solutions is the single-use
nature of the GC construction. This work introduces the novel technique onion garbling,
which circumvents this obstacle by using only a symmetric-key cipher as
its cryptographic machinery. This work also proposes a non-interactive
protocol for verifiable outsourcing which utilizes the onion garbling
technique. The protocol works in a 3-party setting, and consists of a
preprocessing phase and an online phase. The cost of a preprocessing
phase which can support up to N computations is independent of N for the outsourcing party. For the other two parties, the memory and communication cost of N-reusability is proportional to N⋅m" role="presentation">N⋅m, where m is the bit-length of the input. The cost of input preparation and verification is O(m+n)" role="presentation">O(m+n) symmetric-key cipher operations, where n
is the bit-length of the output. The overall costs associated with the
outsourcing party are low enough to allow verifiable outsourcing of
arbitrary computations by resource-constrained devices on constrained
networks. Finally, this work reports on a proof-of-concept
implementation of the proposed verifiable outsourcing protocol.
Ladattava julkaisu This is an electronic reprint of the original article. |