Paper 2016/037

A Framework for Outsourcing of Secure Computation

Thomas P. Jakobsen, Jesper Buus Nielsen, and Claudio Orlandi

Abstract

We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is honest. In our setting there are a number of clients $C_1,\ldots,C_n$ with inputs $x_1,\ldots,x_n$. The clients want to delegate a secure computation of $f(x_1,\ldots,x_n)$ to a set of untrusted workers $W_1,\ldots,W_m$. We want do so in such a way that as long as there is at least one honest worker (and everyone else might be actively corrupted) the following holds: * the privacy of the inputs is preserved; * output of the computation is correct (in particular workers cannot change the inputs of honest clients). We propose a solution where the clients' work is minimal and the interaction pattern simple (one message to upload inputs, one to receive results), while at the same time reducing the overhead for the workers to a minimum. Our solution is generic and can be instantiated with any underlying reactive MPC protocol where linear operations are ``for free''. In contrast previous solutions were less generic and could only be instantiated for specific numbers of clients/workers.

Note: The protocol described in the proceeding version of this paper is susceptible to a selective failure attack which is fixed in this version. We thank Berry Schoenmakers for pointing out the problem.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. ACM CCSW 2014
DOI
10.1145/2664168.2664170
Keywords
outsourcing of computationsecure multiparty computationverifiable computation
Contact author(s)
orlandi @ cs au dk
History
2016-01-14: received
Short URL
https://ia.cr/2016/037
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/037,
      author = {Thomas P.  Jakobsen and Jesper Buus Nielsen and Claudio Orlandi},
      title = {A Framework for Outsourcing of Secure Computation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/037},
      year = {2016},
      doi = {10.1145/2664168.2664170},
      url = {https://eprint.iacr.org/2016/037}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.