Paper 2014/148
Outsourcing Private RAM Computation
Craig Gentry, Shai Halevi, Mariana Raykova, and Daniel Wichs
Abstract
We construct the first schemes that allow a client to privately outsource arbitrary program executions to a remote server while ensuring that: (I) the client's work is small and essentially independent of the complexity of the computation being outsourced, and (II) the server's work is only proportional to the run-time of the computation on a random access machine (RAM), rather than its potentially much larger circuit size. Furthermore, our solutions are non-interactive and have the structure of reusable garbled RAM programs, addressing an open question of Lu and Ostrovsky (Eurocrypt 2013). We also construct schemes for an augmented variant of the above scenario, where the client can initially outsource a large private and persistent database to the server, and later outsource arbitrary program executions with read/write access to this database. Our solutions are built from non-reusable garbled RAM in conjunction with new types of reusable garbled circuits that are more efficient than prior solutions but only satisfy weaker security. For the basic setting without a persistent database, we can instantiate the required reusable garbled circuits using indistinguishability obfuscation. For the more complex setting with a persistent database we need stronger notions of obfuscation. Our basic solution also requires the client to perform a one-time preprocessing step to garble a program at the cost of its RAM run-time, and we can avoid this cost using stronger notions of obfuscation. It remains an open problem to instantiate these new types of reusable garbled circuits under weaker assumptions, possibly avoiding obfuscation altogether.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. FOCS 2014
- Contact author(s)
- wichs @ ccs neu edu
- History
- 2014-08-25: revised
- 2014-02-27: received
- See all versions
- Short URL
- https://ia.cr/2014/148
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/148, author = {Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs}, title = {Outsourcing Private {RAM} Computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/148}, year = {2014}, url = {https://eprint.iacr.org/2014/148} }