Signatures of correct computation

135Citations
Citations of this article
80Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We introduce Signatures of Correct Computation (SCC), a new model for verifying dynamic computations in cloud settings. In the SCC model, a trusted source outsources a function f to an untrusted server, along with a public key for that function (to be used during verification). The server can then produce a succinct signature σ vouching for the correctness of the computation of f, i.e., that some result v is indeed the correct outcome of the function f evaluated on some point a. There are two crucial performance properties that we want to guarantee in an SCC construction: (1) verifying the signature should take asymptotically less time than evaluating the function f; and (2) the public key should be efficiently updated whenever the function changes. We construct SCC schemes (satisfying the above two properties) supporting expressive manipulations over multivariate polynomials, such as polynomial evaluation and differentiation. Our constructions are adaptively secure in the random oracle model and achieve optimal updates, i.e., the function's public key can be updated in time proportional to the number of updated coefficients, without performing a linear-time computation (in the size of the polynomial). We also show that signatures of correct computation imply Publicly Verifiable Computation (PVC), a model recently introduced in several concurrent and independent works. Roughly speaking, in the SCC model, any client can verify the signature σ and be convinced of some computation result, whereas in the PVC model only the client that issued a query (or anyone who trusts this client) can verify that the server returned a valid signature (proof) for the answer to the query. Our techniques can be readily adapted to construct PVC schemes with adaptive security, efficient updates and without the random oracle model. © 2013 International Association for Cryptologic Research.

References Powered by Scopus

Fully Homomorphic Encryption Using Ideal Lattices

4613Citations
N/AReaders
Get full text

Fuzzy identity-based encryption

3775Citations
N/AReaders
Get full text

Conjunctive, subset, and range queries on encrypted data

1136Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

1075Citations
N/AReaders
Get full text

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

539Citations
N/AReaders
Get full text

Functional signatures and pseudorandom functions

246Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Papamanthou, C., Shi, E., & Tamassia, R. (2013). Signatures of correct computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7785 LNCS, pp. 222–242). https://doi.org/10.1007/978-3-642-36594-2_13

Readers over time

‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘22‘23‘2405101520

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 44

70%

Professor / Associate Prof. 8

13%

Lecturer / Post doc 6

10%

Researcher 5

8%

Readers' Discipline

Tooltip

Computer Science 53

84%

Engineering 6

10%

Physics and Astronomy 2

3%

Mathematics 2

3%

Save time finding and organizing research with Mendeley

Sign up for free
0