22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How to Delegate Secure Multiparty Computation to the Cloud<br />

Abstract<br />

We study the problem of verifiable computation in the presence of many clients who rely on a server to<br />

perform computations over inputs privately held by each client. This generalizes the single-client model for<br />

verifiable outsourced computation previously studied in the literature.<br />

We put forward a computational model and strong simulation-based security for this task. We then present<br />

a new protocol that allow the clients to securely outsource an arbitrary polynomial-time computation over privately<br />

held inputs to a powerful server. At the end, the clients will be assured that the result of the computation<br />

is correct, while at the same time protecting their data from the server and each other.<br />

Our new protocol satisfies the crucial efficiency requirement of outsourced computation where the work<br />

of the client is substantially smaller than what is required to compute the function. We use the Gennaro<br />

et al. amortized model, where the clients are allowed to invest in a one-time computationally expensive<br />

preprocessing phase. Our protocol is secure in the real/ideal paradigm even when dishonest clients can collude<br />

with the server in order to learn honest party’s inputs or in order to maliciously change the output of the<br />

computation.<br />

Keywords: verifiable computation, secure multi-party computation<br />

11. How to Delegate Secure Multiparty Computation to the Cloud

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!