Interactive Verifiable Polynomial Evaluation
نویسندگان
چکیده
Cloud computing platforms have created the possibility for computationally limited users to delegate demanding tasks strong but untrusted servers. Verifiable algorithms help build trust in such interactions by enabling server provide a proof of correctness his results which user can check very efficiently. In this article, we present doubly-efficient interactive algorithm verifiable polynomial evaluation. Unlike mainstream literature on computing, soundness our is information-theoretic and cannot be broken unbounded server. By relying basic properties error correcting codes, enforces dishonest false problems become progressively easier verify. After roughly $\log d$ rounds, verify response against look-up table that has been pre-computed during an initialization phase. For degree $d$ , achieve complexity $O(d^{\epsilon })$ $O(d^{1+\epsilon round $O(\log d)$ .
منابع مشابه
Verifiable Private Polynomial Evaluation
Delegating the computation of a polynomial to a server in a verifiable way is challenging. An even more challenging problem is ensuring that this polynomial remains hidden to clients who are able to query such a server. In this paper, we formally define the notion of Private Polynomial Evaluation (PPE). Our main contribution is to design a rigorous security model along with relations between th...
متن کاملVerifiable symmetric polynomial-based key distribution schemes
Symmetric polynomial-based key distribution scheme has been widely adopted in various communication applications. This type of key distribution consists of a server and a set of users, where the server is responsible to distribute shares for each user via a symmetric polynomial. Based on the property of symmetry of this polynomial, each pair of users can compute a common secret key using their ...
متن کاملMulti-User Non-Interactive Verifiable Computation
Gennaro et al. (Crypto 2010) introduced the notion of verifiable computation, which allows a computationally weak client to outsource the computation of a function F on dynamically chosen inputs x1, . . . , x` to a more powerful but untrusted server. Following a pre-processing phase (that is only carried out once), the client can send some representation of its input xi to the server; the serve...
متن کاملVerifiable Computation with Massively Parallel Interactive Proofs
As the cloud computing paradigm has gained prominence, the need for verifiable computation has grown increasingly urgent. Protocols for verifiable computation enable a weak client to outsource difficult computations to a powerful, but untrusted server, in a way that provides the client with a guarantee that the server performed the requested computations correctly. By design, these protocols im...
متن کاملMulti-Client Non-interactive Verifiable Computation
Gennaro et al. (Crypto 2010) introduced the notion of noninteractive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of inputs x, . . . to a more powerful but untrusted server. Following a preprocessing phase (that is carried out only once), the client sends some representation of its current input x to the server; the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal on selected areas in information theory
سال: 2021
ISSN: ['2641-8770']
DOI: https://doi.org/10.1109/jsait.2021.3054865