A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
[chapter]
2009
Lecture Notes in Computer Science
Outsourced databases provide a solution for data owners who want to delegate the task of answering database queries to third-party service providers. ...
We present a solution in which service providers can collaboratively compute aggregate queries without gaining knowledge of intermediate results, and users can verify the results of their queries, relying ...
We also discussed possible variants of our PDAS model, including handling of dynamic databases, multiple data owners, and inference control. ...
doi:10.1007/978-3-642-03168-7_11
fatcat:myrscrkp7zdqfawivismw3zvvi
Verifiable Set Operations over Outsourced Databases
[chapter]
2014
Lecture Notes in Computer Science
We study the problem of verifiable delegation of computation over outsourced data, whereby a powerful worker maintains a large data structure for a weak client in a verifiable way. ...
Compared to the well-studied problem of verifiable computation, this setting imposes additional difficulties since the verifier also needs to check the consistency of updates succinctly and without maintaining ...
Such schemes, originally defined in [26] , model verifiable computations over outsourced data structures. Let D be any data structure supporting queries and updates. ...
doi:10.1007/978-3-642-54631-0_7
fatcat:eiopdi3rwbc6do3macapkh6i3u
Signatures of Correct Computation
[chapter]
2013
Lecture Notes in Computer Science
In the SCC model, a trusted source outsources a function f to an untrusted server, along with a public key for that function (to be used during verification). ...
We also show that signatures of correct computation imply Publicly Verifiable Computation (PVC), a model recently introduced in several concurrent and independent works. ...
This work was supported by Intel through the ISTC for Secure Computing, by the National Science Foundation under grants CCF-0424422, 0842695, 0808617 and CNS-1228485, by the Air Force Office of Scientific ...
doi:10.1007/978-3-642-36594-2_13
fatcat:7pplqm6pkjgytgbqomhnnsq4xq
Multi-matrix verifiable computation
2020
Cluster Computing
The verifiable computation of Gennaro, Gentry, Parno (Crypto'10) allows a client to verify the server's computation of a function with substantially less time than performing the outsourced computation ...
In this paper, we propose a multi-matrix verifiable computation scheme that allows the secure outsourcing of the matrix functions over a finite field. Our scheme is outsourceable. ...
The one-time effort of encoding f can be amortized over the computation of f on multiple inputs, which gives an amortized model for verifiable computation. ...
doi:10.1007/s10586-020-03116-z
fatcat:m2ovywffybfqdbjghh2to5p33a
Optimal Verification of Operations on Dynamic Sets
[chapter]
2011
Lecture Notes in Computer Science
We present new authenticated data structures that allow any entity to publicly verify a proof attesting the correctness of primitive set operations such as intersection, union, subset and set difference ...
We study the design of protocols for set-operation verification, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic ...
The views in this paper do not necessarily reflect the views of the sponsors. ...
doi:10.1007/978-3-642-22792-9_6
fatcat:m5qm2fo3xva7bh5etqttyf5bm4
Keyword-Based Delegable Proofs of Storage
[chapter]
2018
Lecture Notes in Computer Science
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. ...
We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction. ...
Our techniques can be used with any existing publicly verifiable proof-of-storage scheme for static data in order to enable keyword-based audits. ...
doi:10.1007/978-3-319-99807-7_17
fatcat:6s2m7of5mvcjrd3sy6cdnovr44
Keyword-Based Delegable Proofs of Storage
[article]
2018
arXiv
pre-print
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. ...
We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction. ...
Our techniques can be used with any existing publicly verifiable proof-of-storage scheme for static data in order to enable keyword-based audits. ...
arXiv:1712.04417v8
fatcat:zwgd7f4tj5fere4nh5ab5uyfze
Privacy Preservation in Dynamic Bigdata for Verification and Correctness
2017
International Journal Of Engineering And Computer Science
With this batch verification and data update are comparatively increased and reduce computational costs of the system. ...
And also, the requester can verify the correctness of set operation results on the dataset sourced by workers and send to the cloud. ...
Fiore et al. propose a solution for publicly verifiable computation of large polynomials and matrix computations, where anyone can verify the correctness of the results. ...
doi:10.18535/ijecs/v6i4.47
fatcat:t7njfjbxpvbrjji2qdfnpb5efm
Private predictive analysis on encrypted medical data
2014
Journal of Biomedical Informatics
Homomorphic encryption provides a tool for handling such computations on encrypted data, without decrypting the data, and without even needing the decryption key. ...
As sophisticated algorithms for predictive analysis on medical data continue to be developed, it is likely that, in the future, more and more computation will be done on private patient data. ...
Verifiability Verifiability is an issue which is relevant for outsourced computation of any kind. ...
doi:10.1016/j.jbi.2014.04.003
pmid:24835616
fatcat:xk457r5hajbghhjhmcjxy543hu
Revocation in Publicly Verifiable Outsourced Computation
[chapter]
2015
Lecture Notes in Computer Science
In this work, we introduce the notion of Revocable Publicly Verifiable Computation (RPVC), where a cheating server is revoked and may not perform future computations (thus incurring a financial penalty ...
Thus, there is a desire for clients to outsource the evaluation of complex functions to an external server. ...
The cost of setup is amortized over multiple computations of F . S C 1. EKF 2. σF,x 3. θF (x) 4. ...
doi:10.1007/978-3-319-16745-9_4
fatcat:ny6ip5mc7nfdbphth4gr5wzx3e
Geppetto: Versatile Verifiable Computation
2015
2015 IEEE Symposium on Security and Privacy
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. ...
With Multi-QAPs, Geppetto reduces the cost of sharing state between computations (e.g., for MapReduce) or within a single computation by up to two orders of magnitude. ...
For instance, a MapReduce job may need to compute over signed data, or a customer with a smart meter may wish to privately compute a bill over signed readings [48] . ...
doi:10.1109/sp.2015.23
dblp:conf/sp/CostelloFHKKNPZ15
fatcat:pjikpgcgpjg5zayhvhrzkmfcjm
Hash First, Argue Later
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
, where many parties contribute data over a long period of time. ...
Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy. ...
for outsourcing of hash computations as per Definition 5.1 in publicly verifiable (resp. designated verifier) setting. ...
doi:10.1145/2976749.2978368
dblp:conf/ccs/FioreFGKOP16
fatcat:of37dfqn3bghbpenmcsd5g4byq
Publicly Verifiable Outsourced Computation with a Key Distribution Centre
[article]
2014
arXiv
pre-print
Previous work in this area of Publicly Verifiable Outsourced Computation (PVC) requires a costly pre-processing stage. ...
Thus, there is a desire for clients to outsource the evaluation of complex functions to a server and to be able to verify that the resulting value is correct. ...
Publicly Verifiable Computation with a Key Distribution Center (PVC-KDC). ...
arXiv:1406.5720v1
fatcat:ptml6tyy4fgqhlnyqx772d7mli
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
[chapter]
2015
Lecture Notes in Computer Science
However, all the existing works that achieve public verifiability are built upon traditional publickey cryptosystems which imposes a relatively high computational burden on low-power clients (e.g., mobile ...
During an audit, the server must maintain full knowledge of the client's data to pass, even though only a few blocks of the data need to be accessed. ...
Acknowledgments This work is supported in part by US National Science Foundation under grant CNS-1262277 and the National Natural Science Foundation of China (Nos. 61379154 and U1135001). ...
doi:10.1007/978-3-319-24174-6_11
fatcat:mphmzs2khjaxhnj5u77mm3njl4
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
In this work, we construct a publicly verifiable secure cloud storage protocol based on a secure network coding (SNC) protocol where the client can update the outsourced data as needed. ...
To the best of our knowledge, our scheme is the first SNC-based SCS protocol for dynamic data that is secure in the standard model and provides privacy-preserving audits in a publicly verifiable setting ...
The server does some computations (depending upon the challenge) over the stored data, and sends a proof (response) to the client who verifies the integrity of her data based on this proof. ...
doi:10.1145/2897845.2897915
dblp:conf/ccs/SenguptaR16
fatcat:s37gw3ps7japjji3jp2oyokxzu
« Previous
Showing results 1 — 15 out of 807 results