On Black-Box Verifiable Outsourcing

被引:0
作者
Agarwal, Amit [1 ]
Alameti, Navid [2 ]
Khurana, Dakshita [1 ]
Raghuraman, Srinivasan [3 ,4 ]
Rindal, Peter [2 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] Visa Res, Palo Alto, CA USA
[3] Visa Res, Cambridge, MA USA
[4] MIT, Cambridge, MA 02139 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2023, PT I | 2023年 / 14369卷
关键词
D O I
10.1007/978-3-031-48615-9_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study verifiable outsourcing of computation in a model where the verifier has black-box access to the function being computed. We introduce the problem of oracle-aided batch verification of computation (OBVC) for a function class F. This allows a verifier to efficiently verify the correctness of any f is an element of F evaluated on a batch of n instances x(1),..., x(n), while only making lambda calls to an oracle for f (along with O(n lambda) calls to low-complexity helper oracles), for security parameter lambda. We obtain the following positive and negative results: - We build OBVC protocols for the class of all functions that admit random-self-reductions. Some of our protocols rely on homomorphic encryption schemes. - We show that there cannot exist OBVC schemes for the class of all functions mapping lambda-bit inputs to lambda-bit outputs, for any n = poly(lambda).(1)((1) The authors grant IACR a non-exclusive and irrevocable license to distribute the article under the https://creativecommons.org/licenses/by-nc/3.0/.)
引用
收藏
页码:158 / 187
页数:30
相关论文
共 29 条
[1]  
Alman J, 2021, Disc Algorithms, P522
[2]  
[Anonymous], 1991, DISTRIBUTED COMPUTIN
[3]  
Applebaum B, 2010, LECT NOTES COMPUT SC, V6198, P152, DOI 10.1007/978-3-642-14165-2_14
[4]  
Ar S., 1993, Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, P786, DOI 10.1145/167088.167288
[5]   Locally random reductions: Improvements and applications [J].
Beaver, D ;
Feigenbaum, J ;
Kilian, J ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 1997, 10 (01) :17-36
[6]   Batch verification with applications to cryptography and checking [J].
Bellare, M ;
Garay, JA ;
Rabin, T .
LATIN '98: THEORETICAL INFORMATICS, 1998, 1380 :170-191
[7]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[8]  
BLUM M, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P73, DOI 10.1145/100216.100225
[9]  
Brakerski Z., 2016, CRYPTOLOGY EPRINT AR
[10]   Non-interactive Delegation and Batch NP Verification from Standard Computational Assumptions [J].
Brakerski, Zvika ;
Holmgren, Justin ;
Kalai, Yael .
STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, :474-482