Verifiable Outsourcing of Computations Using Garbled Onions
| dc.contributor.author | Dönmez T. | |
| dc.contributor.organization | fi=tietoliikennetekniikka|en=Communication Systems| | |
| dc.contributor.organization-code | 2606801 | |
| dc.converis.publication-id | 36539594 | |
| dc.converis.url | https://research.utu.fi/converis/portal/Publication/36539594 | |
| dc.date.accessioned | 2022-10-27T11:57:30Z | |
| dc.date.available | 2022-10-27T11:57:30Z | |
| dc.description.abstract | <p>Solutions to the verifiable outsourcing problem based on Yao’s Garbled Circuit (GC) construction have been investigated in previous works. A major obstacle to the practicality of these solutions is the single-use nature of the GC construction. This work introduces the novel technique <em>onion garbling</em>, which circumvents this obstacle by using only a symmetric-key cipher as its cryptographic machinery. This work also proposes a non-interactive protocol for verifiable outsourcing which utilizes the onion garbling technique. The protocol works in a 3-party setting, and consists of a preprocessing phase and an online phase. The cost of a preprocessing phase which can support up to <em>N</em> computations is independent of <em>N</em> for the outsourcing party. For the other two parties, the memory and communication cost of <em>N</em>-reusability is proportional to N⋅m" role="presentation">N⋅m, where <em>m</em> is the bit-length of the input. The cost of input preparation and verification is O(m+n)" role="presentation">O(m+n) symmetric-key cipher operations, where <em>n</em> is the bit-length of the output. The overall costs associated with the outsourcing party are low enough to allow verifiable outsourcing of arbitrary computations by resource-constrained devices on constrained networks. Finally, this work reports on a proof-of-concept implementation of the proposed verifiable outsourcing protocol.</p> | |
| dc.format.pagerange | 122 | |
| dc.format.pagerange | 137 | |
| dc.identifier.eisbn | 978-3-030-01141-3 | |
| dc.identifier.isbn | 978-3-030-01140-6 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.jour-issn | 0302-9743 | |
| dc.identifier.olddbid | 173101 | |
| dc.identifier.oldhandle | 10024/156195 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/56110 | |
| dc.identifier.urn | URN:NBN:fi-fe2021042720115 | |
| dc.language.iso | en | |
| dc.okm.affiliatedauthor | Dönmez, Tahsin | |
| dc.okm.discipline | 113 Computer and information sciences | en_GB |
| dc.okm.discipline | 113 Tietojenkäsittely ja informaatiotieteet | fi_FI |
| dc.okm.internationalcopublication | not an international co-publication | |
| dc.okm.internationality | International publication | |
| dc.okm.type | A4 Conference Article | |
| dc.publisher.country | Switzerland | en_GB |
| dc.publisher.country | Sveitsi | fi_FI |
| dc.publisher.country-code | CH | |
| dc.relation.conference | International Workshop on Security and Trust Management | |
| dc.relation.doi | 10.1007/978-3-030-01141-3_8 | |
| dc.relation.ispartofjournal | Lecture Notes in Computer Science | |
| dc.relation.ispartofseries | Lecture Notes in Computer Science | |
| dc.relation.volume | 11091 | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/156195 | |
| dc.title | Verifiable Outsourcing of Computations Using Garbled Onions | |
| dc.title.book | Security and Trust Management: 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings | |
| dc.year.issued | 2018 |
Tiedostot
1 - 1 / 1
Ladataan...
- Name:
- samplepaper.pdf
- Size:
- 437.86 KB
- Format:
- Adobe Portable Document Format
- Description:
- Final draft