Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








807 Hits in 5.7 sec

Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases [chapter]

Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao
2009 Lecture Notes in Computer Science  
Outsourced databases provide a solution for data owners who want to delegate the task of answering database queries to third-party service providers.  ...  We present a solution in which service providers can collaboratively compute aggregate queries without gaining knowledge of intermediate results, and users can verify the results of their queries, relying  ...  We also discussed possible variants of our PDAS model, including handling of dynamic databases, multiple data owners, and inference control.  ... 
doi:10.1007/978-3-642-03168-7_11 fatcat:myrscrkp7zdqfawivismw3zvvi

Verifiable Set Operations over Outsourced Databases [chapter]

Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
2014 Lecture Notes in Computer Science  
We study the problem of verifiable delegation of computation over outsourced data, whereby a powerful worker maintains a large data structure for a weak client in a verifiable way.  ...  Compared to the well-studied problem of verifiable computation, this setting imposes additional difficulties since the verifier also needs to check the consistency of updates succinctly and without maintaining  ...  Such schemes, originally defined in [26] , model verifiable computations over outsourced data structures. Let D be any data structure supporting queries and updates.  ... 
doi:10.1007/978-3-642-54631-0_7 fatcat:eiopdi3rwbc6do3macapkh6i3u

Signatures of Correct Computation [chapter]

Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
2013 Lecture Notes in Computer Science  
In the SCC model, a trusted source outsources a function f to an untrusted server, along with a public key for that function (to be used during verification).  ...  We also show that signatures of correct computation imply Publicly Verifiable Computation (PVC), a model recently introduced in several concurrent and independent works.  ...  This work was supported by Intel through the ISTC for Secure Computing, by the National Science Foundation under grants CCF-0424422, 0842695, 0808617 and CNS-1228485, by the Air Force Office of Scientific  ... 
doi:10.1007/978-3-642-36594-2_13 fatcat:7pplqm6pkjgytgbqomhnnsq4xq

Multi-matrix verifiable computation

Yan He, Liang Feng Zhang
2020 Cluster Computing  
The verifiable computation of Gennaro, Gentry, Parno (Crypto'10) allows a client to verify the server's computation of a function with substantially less time than performing the outsourced computation  ...  In this paper, we propose a multi-matrix verifiable computation scheme that allows the secure outsourcing of the matrix functions over a finite field. Our scheme is outsourceable.  ...  The one-time effort of encoding f can be amortized over the computation of f on multiple inputs, which gives an amortized model for verifiable computation.  ... 
doi:10.1007/s10586-020-03116-z fatcat:m2ovywffybfqdbjghh2to5p33a

Optimal Verification of Operations on Dynamic Sets [chapter]

Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2011 Lecture Notes in Computer Science  
We present new authenticated data structures that allow any entity to publicly verify a proof attesting the correctness of primitive set operations such as intersection, union, subset and set difference  ...  We study the design of protocols for set-operation verification, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic  ...  The views in this paper do not necessarily reflect the views of the sponsors.  ... 
doi:10.1007/978-3-642-22792-9_6 fatcat:m5qm2fo3xva7bh5etqttyf5bm4

Keyword-Based Delegable Proofs of Storage [chapter]

Binanda Sengupta, Sushmita Ruj
2018 Lecture Notes in Computer Science  
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.  ...  We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction.  ...  Our techniques can be used with any existing publicly verifiable proof-of-storage scheme for static data in order to enable keyword-based audits.  ... 
doi:10.1007/978-3-319-99807-7_17 fatcat:6s2m7of5mvcjrd3sy6cdnovr44

Keyword-Based Delegable Proofs of Storage [article]

Binanda Sengupta, Sushmita Ruj
2018 arXiv   pre-print
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.  ...  We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction.  ...  Our techniques can be used with any existing publicly verifiable proof-of-storage scheme for static data in order to enable keyword-based audits.  ... 
arXiv:1712.04417v8 fatcat:zwgd7f4tj5fere4nh5ab5uyfze

Privacy Preservation in Dynamic Bigdata for Verification and Correctness

Guthula Anitha Rani, Prof P Suresh Varma
2017 International Journal Of Engineering And Computer Science  
With this batch verification and data update are comparatively increased and reduce computational costs of the system.  ...  And also, the requester can verify the correctness of set operation results on the dataset sourced by workers and send to the cloud.  ...  Fiore et al. propose a solution for publicly verifiable computation of large polynomials and matrix computations, where anyone can verify the correctness of the results.  ... 
doi:10.18535/ijecs/v6i4.47 fatcat:t7njfjbxpvbrjji2qdfnpb5efm

Private predictive analysis on encrypted medical data

Joppe W. Bos, Kristin Lauter, Michael Naehrig
2014 Journal of Biomedical Informatics  
Homomorphic encryption provides a tool for handling such computations on encrypted data, without decrypting the data, and without even needing the decryption key.  ...  As sophisticated algorithms for predictive analysis on medical data continue to be developed, it is likely that, in the future, more and more computation will be done on private patient data.  ...  Verifiability Verifiability is an issue which is relevant for outsourced computation of any kind.  ... 
doi:10.1016/j.jbi.2014.04.003 pmid:24835616 fatcat:xk457r5hajbghhjhmcjxy543hu

Revocation in Publicly Verifiable Outsourced Computation [chapter]

James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015 Lecture Notes in Computer Science  
In this work, we introduce the notion of Revocable Publicly Verifiable Computation (RPVC), where a cheating server is revoked and may not perform future computations (thus incurring a financial penalty  ...  Thus, there is a desire for clients to outsource the evaluation of complex functions to an external server.  ...  The cost of setup is amortized over multiple computations of F . S C 1. EKF 2. σF,x 3. θF (x) 4.  ... 
doi:10.1007/978-3-319-16745-9_4 fatcat:ny6ip5mc7nfdbphth4gr5wzx3e

Geppetto: Versatile Verifiable Computation

Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
2015 2015 IEEE Symposium on Security and Privacy  
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties.  ...  With Multi-QAPs, Geppetto reduces the cost of sharing state between computations (e.g., for MapReduce) or within a single computation by up to two orders of magnitude.  ...  For instance, a MapReduce job may need to compute over signed data, or a customer with a smart meter may wish to privately compute a bill over signed readings [48] .  ... 
doi:10.1109/sp.2015.23 dblp:conf/sp/CostelloFHKKNPZ15 fatcat:pjikpgcgpjg5zayhvhrzkmfcjm

Hash First, Argue Later

Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
, where many parties contribute data over a long period of time.  ...  Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy.  ...  for outsourcing of hash computations as per Definition 5.1 in publicly verifiable (resp. designated verifier) setting.  ... 
doi:10.1145/2976749.2978368 dblp:conf/ccs/FioreFGKOP16 fatcat:of37dfqn3bghbpenmcsd5g4byq

Publicly Verifiable Outsourced Computation with a Key Distribution Centre [article]

James Alderman, Carlos Cid, Jason Crampton, Christian Janson
2014 arXiv   pre-print
Previous work in this area of Publicly Verifiable Outsourced Computation (PVC) requires a costly pre-processing stage.  ...  Thus, there is a desire for clients to outsource the evaluation of complex functions to a server and to be able to verify that the resulting value is correct.  ...  Publicly Verifiable Computation with a Key Distribution Center (PVC-KDC).  ... 
arXiv:1406.5720v1 fatcat:ptml6tyy4fgqhlnyqx772d7mli

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification [chapter]

Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
2015 Lecture Notes in Computer Science  
However, all the existing works that achieve public verifiability are built upon traditional publickey cryptosystems which imposes a relatively high computational burden on low-power clients (e.g., mobile  ...  During an audit, the server must maintain full knowledge of the client's data to pass, even though only a few blocks of the data need to be accessed.  ...  Acknowledgments This work is supported in part by US National Science Foundation under grant CNS-1262277 and the National Natural Science Foundation of China (Nos. 61379154 and U1135001).  ... 
doi:10.1007/978-3-319-24174-6_11 fatcat:mphmzs2khjaxhnj5u77mm3njl4

Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding

Binanda Sengupta, Sushmita Ruj
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
In this work, we construct a publicly verifiable secure cloud storage protocol based on a secure network coding (SNC) protocol where the client can update the outsourced data as needed.  ...  To the best of our knowledge, our scheme is the first SNC-based SCS protocol for dynamic data that is secure in the standard model and provides privacy-preserving audits in a publicly verifiable setting  ...  The server does some computations (depending upon the challenge) over the stored data, and sends a proof (response) to the client who verifies the integrity of her data based on this proof.  ... 
doi:10.1145/2897845.2897915 dblp:conf/ccs/SenguptaR16 fatcat:s37gw3ps7japjji3jp2oyokxzu
« Previous Showing results 1 — 15 out of 807 results