Publications

Detailed Information

Efficient verifiable computation over quotient polynomial rings

DC Field Value Language
dc.contributor.authorPark, Jai Hyun-
dc.contributor.authorCheon, Jung Hee-
dc.contributor.authorKim, Dongwoo-
dc.date.accessioned2022-10-17T04:05:22Z-
dc.date.available2022-10-17T04:05:22Z-
dc.date.created2022-10-07-
dc.date.issued2022-10-
dc.identifier.citationInternational Journal of Information Security, Vol.21 No.5, pp.953-971-
dc.identifier.issn1615-5262-
dc.identifier.urihttps://hdl.handle.net/10371/186130-
dc.description.abstractIn a situation where computation and data are delegated to the third party, e.g., in cloud computing services, securing both data privacy and computation integrity simultaneously has been a challenging problem. Recently, (Fiore et al., 2014) proposed a generic solution where the data privacy is guaranteed with homomorphic encryption (HE) and the computation integrity is guaranteed with verifiable computation (VC) on the ciphertext operations of HE. However, the main bottleneck was the huge cost of VC for operations of ciphertexts which are over quotient polynomial rings. In this paper, we propose an efficient VC for operations of quotient polynomial rings, which can resolve this bottleneck. Specifically, we adapt Goldwasser, Kalai, Rothblum's interactive proof protocol (a.k.a. GKR protocol), and its recent refinements to handle arithmetic of a quotient polynomial ringmore efficiently. The main ideas are (i) to generalize the previous approaches exploiting commitment schemes for efficient verification of field operations to the case of polynomial ring operations, and (ii) to reduce the verification of operations on polynomials to that of operations on scalars. As a result, our method provides substantial asymptotic efficiency improvement (roughly, xlog N- N where N is the degree of polynomials) compared to usual VC when verifying operations of quotient polynomial rings, which is also confirmed by our experimental evaluation.-
dc.language영어-
dc.publisherSpringer Verlag-
dc.titleEfficient verifiable computation over quotient polynomial rings-
dc.typeArticle-
dc.identifier.doi10.1007/s10207-022-00590-x-
dc.citation.journaltitleInternational Journal of Information Security-
dc.identifier.wosid000857358200001-
dc.identifier.scopusid2-s2.0-85128542987-
dc.citation.endpage971-
dc.citation.number5-
dc.citation.startpage953-
dc.citation.volume21-
dc.description.isOpenAccessN-
dc.contributor.affiliatedAuthorCheon, Jung Hee-
dc.type.docTypeArticle-
dc.description.journalClass1-
Appears in Collections:
Files in This Item:
There are no files associated with this item.

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share