Paper 2011/518
Two 1-Round Protocols for Delegation of Computation
Ran Canetti, Ben Riva, and Guy N. Rothblum
Abstract
Consider a weak client that wishes to delegate computation to an untrusted server and be able to succinctly verify the correctness of the result, all within one round of interaction. We provide solutions for two relaxed variants of this problem. Specifically:
\begin{itemize}
\item We consider a model where the client delegates the computation to {\em two or more} servers, and is guaranteed to output the correct answer as long as even a {\em single} server is honest. We call this model \emph{Refereed Delegation of Computation (RDoC)}. In this model, we show a 1-round {\sf unconditionally statistically sound} protocol for any log-space uniform
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- verifiable computationdelegation of computation
- Contact author(s)
- benriva @ post tau ac il
- History
- 2011-09-22: received
- Short URL
- https://ia.cr/2011/518
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/518, author = {Ran Canetti and Ben Riva and Guy N. Rothblum}, title = {Two 1-Round Protocols for Delegation of Computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/518}, year = {2011}, url = {https://eprint.iacr.org/2011/518} }