Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516681
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable delegation of computation on outsourced data

Abstract: Abstract. We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function on some portion of its outsourced data. In this scenario, the client must be able to efficiently verify the correctness of the result despite no longer knowing the inputs of the delegated computation, it must be able to keep adding elements to its remote storage, and it does not have to fix in advance (i.e., at data outs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
134
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 161 publications
(143 citation statements)
references
References 49 publications
(106 reference statements)
0
134
0
Order By: Relevance
“…The problem of verifiable matrix computation has been studied in recent literature [24,39,4,9]. In addition to computation verification, existing solutions offer other important security features that are: 1) data protection, i.e., protection of both input and output matrices throughout the computation; 2) public verifiability, i.e., the ability of any entity to verify the result of outsourced computation; and 3) deterministic verification, i.e., the ability to detect faulty cells in an output matrix with probability 1.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The problem of verifiable matrix computation has been studied in recent literature [24,39,4,9]. In addition to computation verification, existing solutions offer other important security features that are: 1) data protection, i.e., protection of both input and output matrices throughout the computation; 2) public verifiability, i.e., the ability of any entity to verify the result of outsourced computation; and 3) deterministic verification, i.e., the ability to detect faulty cells in an output matrix with probability 1.…”
Section: Related Workmentioning
confidence: 99%
“…Note that we treat deterministic verification as a property that is non-trivial to achieve and thus consider only the work of Fiore et al [24] and Backes et al [9]. The construction of [9], however, is based on the scheme of [24] and would offer the same performance as that of [24] in our setting (the advantage of [9] is that it allows for more flexible function specification and scheduling).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Delegation of data storage and computation to the cloud has become common practice for individuals and big enterprises alike [1,2]. As a result, often the need arises for clients to perform computation on their outsourced private data jointly, ideally without the need to download the data.…”
Section: Introductionmentioning
confidence: 99%