Verifiable Outsourcing of Computations Using Garbled Onions

dc.contributor.authorDönmez T.
dc.contributor.organizationfi=tietoliikennetekniikka|en=Communication Systems|
dc.contributor.organization-code2606801
dc.converis.publication-id36539594
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/36539594
dc.date.accessioned2022-10-27T11:57:30Z
dc.date.available2022-10-27T11:57:30Z
dc.description.abstract<p>Solutions to the verifiable outsourcing problem based on Yao’s Garbled Circuit (GC) construction have been investigated in previous works. A major obstacle to the practicality of these solutions is the single-use nature of the GC construction. This work introduces the novel technique <em>onion garbling</em>, which circumvents this obstacle by using only a symmetric-key cipher as its cryptographic machinery. This work also proposes a non-interactive protocol for verifiable outsourcing which utilizes the onion garbling technique. The protocol works in a 3-party setting, and consists of a preprocessing phase and an online phase. The cost of a preprocessing phase which can support up to <em>N</em> computations is independent of <em>N</em> for the outsourcing party. For the other two parties, the memory and communication cost of <em>N</em>-reusability is proportional to N⋅m" role="presentation">N⋅m, where <em>m</em> is the bit-length of the input. The cost of input preparation and verification is O(m+n)" role="presentation">O(m+n) symmetric-key cipher operations, where <em>n</em> is the bit-length of the output. The overall costs associated with the outsourcing party are low enough to allow verifiable outsourcing of arbitrary computations by resource-constrained devices on constrained networks. Finally, this work reports on a proof-of-concept implementation of the proposed verifiable outsourcing protocol.</p>
dc.format.pagerange122
dc.format.pagerange137
dc.identifier.eisbn978-3-030-01141-3
dc.identifier.isbn978-3-030-01140-6
dc.identifier.issn0302-9743
dc.identifier.jour-issn0302-9743
dc.identifier.olddbid173101
dc.identifier.oldhandle10024/156195
dc.identifier.urihttps://www.utupub.fi/handle/11111/56110
dc.identifier.urnURN:NBN:fi-fe2021042720115
dc.language.isoen
dc.okm.affiliatedauthorDönmez, Tahsin
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA4 Conference Article
dc.publisher.countrySwitzerlanden_GB
dc.publisher.countrySveitsifi_FI
dc.publisher.country-codeCH
dc.relation.conferenceInternational Workshop on Security and Trust Management
dc.relation.doi10.1007/978-3-030-01141-3_8
dc.relation.ispartofjournalLecture Notes in Computer Science
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.relation.volume11091
dc.source.identifierhttps://www.utupub.fi/handle/10024/156195
dc.titleVerifiable Outsourcing of Computations Using Garbled Onions
dc.title.bookSecurity and Trust Management: 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings
dc.year.issued2018

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
samplepaper.pdf
Size:
437.86 KB
Format:
Adobe Portable Document Format
Description:
Final draft