Paper 2014/762

Access Control in Publicly Verifiable Outsourced Computation

James Alderman, Christian Janson, Carlos Cid, and Jason Crampton


Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources to delegate expensive computations to more powerful external servers, and to verify the correctness of results. Whilst this is highly beneficial in many situations, it also increases the visibility and availability of potentially sensitive data, and thus we may wish to limit the set of entities with access to input data and results. Additionally, within an organization it is extremely unlikely that every user would have uncontrolled access to all functionality. It is also not always reasonable to publish the results of a sensitive computation. Thus there is a need to apply access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC) that applies cryptographic enforcement mechanisms to address these concerns, and we provide a provably secure instantiation using Key Assignment Schemes. We also discuss example policies of interest in this setting.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. MAJOR revision.ASIACCS 2015
Publicly Verifiable Outsourced ComputationAccess Control PoliciesKey Assignment Scheme
Contact author(s)
Christian Janson 2012 @ live rhul ac uk
2015-03-25: last of 2 revisions
2014-09-30: received
See all versions
Short URL
Creative Commons Attribution


      author = {James Alderman and Christian Janson and Carlos Cid and Jason Crampton},
      title = {Access Control in Publicly Verifiable Outsourced Computation},
      howpublished = {Cryptology ePrint Archive, Paper 2014/762},
      year = {2014},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.