Paper 2016/037
A Framework for Outsourcing of Secure Computation
Thomas P. Jakobsen, Jesper Buus Nielsen, and Claudio Orlandi
Abstract
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest. In our setting there are a number of clients $C_1,\ldots,C_n$ with inputs $x_1,\ldots,x_n$. The clients want to delegate a secure computation of $f(x_1,\ldots,x_n)$ to a set of untrusted workers $W_1,\ldots,W_m$. We want do so in such a way that as long as there is at least one honest worker (and everyone else might be actively corrupted) the following holds: * the privacy of the inputs is preserved; * output of the computation is correct (in particular workers cannot change the inputs of honest clients). We propose a solution where the clients' work is minimal and the interaction pattern simple (one message to upload inputs, one to receive results), while at the same time reducing the overhead for the workers to a minimum. Our solution is generic and can be instantiated with any underlying reactive MPC protocol where linear operations are ``for free''. In contrast previous solutions were less generic and could only be instantiated for specific numbers of clients/workers.
Note: The protocol described in the proceeding version of this paper is susceptible to a selective failure attack which is fixed in this version. We thank Berry Schoenmakers for pointing out the problem.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. ACM CCSW 2014
- DOI
- 10.1145/2664168.2664170
- Keywords
- outsourcing of computationsecure multiparty computationverifiable computation
- Contact author(s)
- orlandi @ cs au dk
- History
- 2016-01-14: received
- Short URL
- https://ia.cr/2016/037
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/037, author = {Thomas P. Jakobsen and Jesper Buus Nielsen and Claudio Orlandi}, title = {A Framework for Outsourcing of Secure Computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/037}, year = {2016}, doi = {10.1145/2664168.2664170}, url = {https://eprint.iacr.org/2016/037} }