Skip to main content

2023 | OriginalPaper | Buchkapitel

On Black-Box Verifiable Outsourcing

verfasst von : Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, Peter Rindal

Erschienen in: Theory of Cryptography

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We study verifiable outsourcing of computation in a model where the verifier has black-box access to the function being computed. We introduce the problem of oracle-aided batch verification of computation (OBVC) for a function class \(\mathcal {F}\). This allows a verifier to efficiently verify the correctness of any \(f \in \mathcal {F}\) evaluated on a batch of n instances \(x_1, \ldots , x_n\), while only making \(\lambda \) calls to an oracle for f (along with \(O(n \lambda )\) calls to low-complexity helper oracles), for security parameter \(\lambda \). We obtain the following positive and negative results:
  • We build OBVC protocols for the class of all functions that admit random-self-reductions. Some of our protocols rely on homomorphic encryption schemes.
  • We show that there cannot exist OBVC schemes for the class of all functions mapping \(\lambda \)-bit inputs to \(\lambda \)-bit outputs, for any \(n = \textsf{poly} (\lambda )\).\(^{1}\)(\(^{1}\) The authors grant IACR a non-exclusive and irrevocable license to distribute the article under the https://​creativecommons.​org/​licenses/​by-nc/​3.​0/​.)

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We use \(\frac{{\lambda }}{2K}\) as opposed to \(\frac{{\lambda }}{2}\) as this is what we need in the setting of K provers to make the rest of the analysis work out.
 
2
For syntactic simplicity, we only consider functions with a single bit output. The generalization to functions with arbitrary output length can be done by splitting a multi-bit output function into multiple functions with single bit output.
 
3
In cases where \(T_f(\ell )\) is not known, due to circuit lower bound barriers, we can fix \(T_f(\ell )\) to be the best known time complexity for computing f on (worst-case) inputs of size \(\ell \). For example, if f is the matrix multiplication function of two \(\ell \times \ell \) bit matrices, then we can set \(T_f(\ell ) = \ell ^{2.3728596}\) for inputs of length \(2{\ell }^2\) (encoding two \(\ell \times \ell \) sized bit-matrix as a bit-string) based on the fastest known matrix multiplication algorithm [1].
 
Literatur
1.
Zurück zum Zitat Alman, J., Williams, V.V.: A refined laser method and faster matrix multiplication. In: Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 522–539. SIAM (2021) Alman, J., Williams, V.V.: A refined laser method and faster matrix multiplication. In: Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 522–539. SIAM (2021)
2.
Zurück zum Zitat Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152–163. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14165-2_14CrossRef Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152–163. Springer, Heidelberg (2010). https://​doi.​org/​10.​1007/​978-3-642-14165-2_​14CrossRef
3.
Zurück zum Zitat Ar, S., Blum, M., Codenotti, B., Gemmell, P.: Checking approximate computations over the reals. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, pp. 786–795 (1993) Ar, S., Blum, M., Codenotti, B., Gemmell, P.: Checking approximate computations over the reals. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, pp. 786–795 (1993)
4.
Zurück zum Zitat Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: improvements and applications. J. Cryptol. 10(1), 17–36 (1997)MathSciNetCrossRefMATH Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: improvements and applications. J. Cryptol. 10(1), 17–36 (1997)MathSciNetCrossRefMATH
6.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
7.
Zurück zum Zitat Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, pp. 73–83 (1990) Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, pp. 73–83 (1990)
8.
Zurück zum Zitat Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs. In: Distributed Computing and Cryptography: Proceedings of a DIMACS Workshop, October 4–6, 1989, vol. 2, p. 107. American Mathematical Soc. (1991) Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs. In: Distributed Computing and Cryptography: Proceedings of a DIMACS Workshop, October 4–6, 1989, vol. 2, p. 107. American Mathematical Soc. (1991)
9.
Zurück zum Zitat Brakerski, Z., Holmgren, J., Kalai, Y.: Non-interactive ram and batch NP delegation from any PIR. Cryptology ePrint Archive (2016) Brakerski, Z., Holmgren, J., Kalai, Y.: Non-interactive ram and batch NP delegation from any PIR. Cryptology ePrint Archive (2016)
10.
Zurück zum Zitat Brakerski, Z., Holmgren, J., Kalai, Y.: Non-interactive delegation and batch NP verification from standard computational assumptions. In: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, pp. 474–482 (2017) Brakerski, Z., Holmgren, J., Kalai, Y.: Non-interactive delegation and batch NP verification from standard computational assumptions. In: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, pp. 474–482 (2017)
11.
Zurück zum Zitat Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831–871 (2014)MathSciNetCrossRefMATH Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831–871 (2014)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Cleve, R., Luby, M.: A note on self-testing/correcting methods for trigonometric functions. International Computer Science Inst. (1990) Cleve, R., Luby, M.: A note on self-testing/correcting methods for trigonometric functions. International Computer Science Inst. (1990)
18.
Zurück zum Zitat Gemmell, P., Lipton, R., Rubinfeld, R., Sudan, M., Wigderson, A.: Self-testing/Correcting for polynomials and for approximate functions. In: STOC, vol. 91, pp. 32–42. Citeseer (1991) Gemmell, P., Lipton, R., Rubinfeld, R., Sudan, M., Wigderson, A.: Self-testing/Correcting for polynomials and for approximate functions. In: STOC, vol. 91, pp. 32–42. Citeseer (1991)
20.
Zurück zum Zitat Hoeffding, W.: Probability inequalities for sums of bounded random variables. The Collected Works of Wassily Hoeffding, pp. 409–426 (1994) Hoeffding, W.: Probability inequalities for sums of bounded random variables. The Collected Works of Wassily Hoeffding, pp. 409–426 (1994)
21.
Zurück zum Zitat Hulett, J., Jawale, R., Khurana, D., Srinivasan, A.: SNARGs for P from sub-exponential DDH and QR. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology - EUROCRYPT 2022, Part II. Lecture Notes in Computer Science, vol. 13276, pp. 520–549. Springer, Heidelberg, Germany, Trondheim, Norway (May 30 - Jun 3, 2022). https://doi.org/10.1007/978-3-031-07085-3_18 Hulett, J., Jawale, R., Khurana, D., Srinivasan, A.: SNARGs for P from sub-exponential DDH and QR. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology - EUROCRYPT 2022, Part II. Lecture Notes in Computer Science, vol. 13276, pp. 520–549. Springer, Heidelberg, Germany, Trondheim, Norway (May 30 - Jun 3, 2022). https://​doi.​org/​10.​1007/​978-3-031-07085-3_​18
22.
Zurück zum Zitat Jawale, R., Kalai, Y.T., Khurana, D., Zhang, R.Y.: SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE. In: Khuller, S., Williams, V.V. (eds.) STOC ’21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual Event, Italy, June 21–25, 2021, pp. 708–721. ACM (2021). https://doi.org/10.1145/3406325.3451055 Jawale, R., Kalai, Y.T., Khurana, D., Zhang, R.Y.: SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE. In: Khuller, S., Williams, V.V. (eds.) STOC ’21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual Event, Italy, June 21–25, 2021, pp. 708–721. ACM (2021). https://​doi.​org/​10.​1145/​3406325.​3451055
23.
Zurück zum Zitat Kalai, Y.T., Raz, R., Rothblum, R.D.: How to delegate computations: the power of no-signaling proofs. In: Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing, pp. 485–494 (2014) Kalai, Y.T., Raz, R., Rothblum, R.D.: How to delegate computations: the power of no-signaling proofs. In: Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing, pp. 485–494 (2014)
24.
Zurück zum Zitat Kilian, J.: A note on efficient zero-knowledge proofs and arguments. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, pp. 723–732 (1992) Kilian, J.: A note on efficient zero-knowledge proofs and arguments. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, pp. 723–732 (1992)
25.
Metadaten
Titel
On Black-Box Verifiable Outsourcing
verfasst von
Amit Agarwal
Navid Alamati
Dakshita Khurana
Srinivasan Raghuraman
Peter Rindal
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-48615-9_6

Premium Partner