Proceedings of the 18th ACM Conference on Computer and Communications Security 2011
DOI: 10.1145/2046707.2046759
|View full text |Cite
|
Sign up to set email alerts
|

Practical delegation of computation using multiple servers

Abstract: The current move to Cloud Computing raises the need for verifiable delegation of computations, where a weak client delegates his computation to a powerful server, while maintaining the ability to verify that the result is correct. Although there are prior solutions to this problem, none of them is yet both general and practical for real-world use.We demonstrate a relatively efficient and general solution where the client delegates the computation to several servers, and is guaranteed to determine the correct a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
80
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 102 publications
(82 citation statements)
references
References 23 publications
0
80
0
Order By: Relevance
“…The notion of delegation of cryptographic operations is already mature: Starting from early work on proxy signatures [28] and proxy cryptography [5], basic primitives such as signatures (e.g., [6,28]) and encryption (e.g., [2,19,22]) have been studied in the context of an untrusted proxy who is authorized to operate on signatures or ciphertexts. Recently, there has also been an increased interest in verifiability and privacy of general outsourced computations (e.g., [1,9,10,18,33]) or specific crypto-related operations (e.g., [4,15,20]). To the best of our knowledge, however, no prior work explicitly and formally examines the delegation of PRFs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The notion of delegation of cryptographic operations is already mature: Starting from early work on proxy signatures [28] and proxy cryptography [5], basic primitives such as signatures (e.g., [6,28]) and encryption (e.g., [2,19,22]) have been studied in the context of an untrusted proxy who is authorized to operate on signatures or ciphertexts. Recently, there has also been an increased interest in verifiability and privacy of general outsourced computations (e.g., [1,9,10,18,33]) or specific crypto-related operations (e.g., [4,15,20]). To the best of our knowledge, however, no prior work explicitly and formally examines the delegation of PRFs.…”
Section: Related Workmentioning
confidence: 99%
“…We illustrate with a simple example using the tree from Figure 2. Consider ranges [2,7] and [9,14], both with size 6. The trapdoors generated for these ranges are ((f k (001), 1), (f k (01), 2) and (f k (101), 1), (f k (1001), 0), (f k (110), 1), (f k (1110), 0) , respectively.…”
Section: The Brc Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…Theoretical results already exist concerning the execution of complex computations in a way, such that the results can be trusted [3,5]. Their currently is a project developing a concrete implementation [6] based on the theoretical foundations from [3,5], and will allow smart contracts to trigger a trusted computation and access the result.…”
Section: Related Workmentioning
confidence: 99%
“…Their currently is a project developing a concrete implementation [6] based on the theoretical foundations from [3,5], and will allow smart contracts to trigger a trusted computation and access the result.…”
Section: Related Workmentioning
confidence: 99%