2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.24
|View full text |Cite
|
Sign up to set email alerts
|

ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data

Abstract: We study the problem of privacy-preserving proofs on authenticated data, where a party receives data from a trusted source and is requested to prove computations over the data to third parties in a correct and private way, i.e., the third party learns no information on the data but is still assured that the claimed proof is valid. Our work particularly focuses on the challenging requirement that the third party should be able to verify the validity with respect to the specific data authenticated by the source-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
40
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(41 citation statements)
references
References 28 publications
(45 reference statements)
1
40
0
Order By: Relevance
“…Another line of work uses argument protocols, both interactive [73][74][75] and non-interactive [14,21,26,47,56,66] ("SNARK" refers to the latter). However, these protocols seem incompatible with hardware implementation (as discussed in prior work [82, §9]) and impose cryptographic assumptions (strong ones in the non-interactive setting).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another line of work uses argument protocols, both interactive [73][74][75] and non-interactive [14,21,26,47,56,66] ("SNARK" refers to the latter). However, these protocols seem incompatible with hardware implementation (as discussed in prior work [82, §9]) and impose cryptographic assumptions (strong ones in the non-interactive setting).…”
Section: Related Workmentioning
confidence: 99%
“…There are a few exceptions. In the zkSNARK setting, the cost assessment depends on the premium that one is willing to pay for otherwise unachievable functionality [14,18,39]. Also, two works in the verifiable outsourcing setting do not require precomputation.…”
Section: Related Workmentioning
confidence: 99%
“…RESULT verify_job(DATA b0, QUERY b1) { commitment cs [4]; cs[0] = b0->c; // reuse commitment produced by save_DATA cs[1] = b1->c; // reuse commitment produced by save_QUERY RESULT b2 = load_recommit_RESULT(); cs[2] = b2->c; load_verify_commit(&STATE.vk, &cs [3], C_job_LOCALS); cProof pi; load_cProof("job", &pi, outsource_id, RUN_TIME); verify_proof(&STATE.vk, &pi, 4, cs); return b2; } Just like job, verify_job takes two buses and returns a bus. The input buses propagate trusted commitments from the caller; in particular, the bigdata commitment is shared across all calls.…”
Section: Programming Modelmentioning
confidence: 99%
“…Currently, the best performing, fully general-purpose verifiable computation protocols [51,55] are based on Quadratic Arithmetic Programs (QAPs) [33]. To provide non-interactive, publicly verifiable computation, as well as zero-knowledge proofs (i.e., computations in which some or all of the worker's inputs are private) recent systems [4,8,10,11,18,27,43,61] have converged on the Pinocchio protocol [51] as a cryptographic back end. Pinocchio, in turn, depends on QAPs.…”
Section: Introductionmentioning
confidence: 99%
“…The approach based on leveled homomorphic signatures [29] is more expressive but still very expensive in practice, as the size of the proof (i.e., evaluated signature) is polynomial in the depth of the computation's circuit. AD-SNARKs [3] provide a functionality similar to homomorphic authenticators, working efficiently for arbitrary computations, but even in their case the set of computations has to be fixed a priori. As a further restriction, the model of both homomorphic authenticators and AD-SNARKs requires a secret key for data outsourcing, and it only supports append-only data uploading (i.e., it does not support changing the uploaded data).…”
Section: Related Workmentioning
confidence: 99%