Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2033036.2033048guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Memory delegation

Published: 14 August 2011 Publication History

Abstract

We consider the problem of delegating computation, where the delegator doesn't even know the input to the function being delegated, and runs in time significantly smaller than the input length.
For example, consider the setting of memory delegation, where a delegator wishes to delegate her entire memory to the cloud. The delegator may want the cloud to compute functions on this memory, and prove that the functions were computed correctly. As another example, consider the setting of streaming delegation, where a stream of data goes by, and a delegator, who cannot store this data, delegates this task to the cloud. Later the delegator may ask the cloud to compute statistics on this streaming data, and prove the correctness of the computation. We note that in both settings the delegator must keep a (short) certificate of the data being delegated, in order to later verify the correctness of the computations. Moreover, in the streaming setting, this certificate should be computed in a streaming manner.
We construct both memory and streaming delegation schemes. We present non-interactive constructions based on the (standard) delegation scheme of Goldwasswer et. al. [GKR08]. These schemes allow the delegation of any function computable by an L-uniform circuit of low depth (the complexity of the delegator depends linearly on the depth). For memory delegation, we rely on the existence of a polylog PIR scheme, and for streaming, we rely on the existence of a fully homomorphic encryption scheme.
We also present constructions based on the CS-proofs of Micali. These schemes allow the delegation of any function in P. However, they are interactive (i.e., consists of 4 messages), or are non-interactive in the Random Oracle Model.

References

[1]
Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010)
[2]
Barak, B.: How to go beyond the black-box simulation barrier. In: FOCS, pp. 106-115 (2001)
[3]
Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37(2), 156-189 (1988)
[4]
Babai, L., Fortnow, L., Lund, C.: Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity 1, 3-40 (1991)
[5]
Babai, L., Fortnow, L., Levin, L.A., Szegedy, M.: Checking computations in polylogarithmic time. In: STOC, pp. 21-31 (1991)
[6]
Barak, B., Goldreich, O.: Universal arguments and their applications. In: Proceedings of the 17th Annual IEEE Conference on Computational Complexity, pp. 194-203 (2002)
[7]
Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In: FOCS, pp. 374-383 (1997)
[8]
Bellare, M., Rogaway, P.: Minimizing the use of random oracles in authenticated encryption schemes. In: ICICS, pp. 1-16 (1997)
[9]
Ben-Sasson, E., Goldreich, O., Harsha, P., Sudan, M., Vadhan, S.P.: Short pcps verifiable in polylogarithmic time. In: IEEE Conference on Computational Complexity, pp. 120-134 (2005)
[10]
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
[11]
Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005)
[12]
Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. Cryptology ePrint Archive, Report 2011/273 (2011), http://eprint.iacr.org/
[13]
Chung, K.-M., Kalai, Y., Vadhan, S.P.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
[14]
Cormode, G., Thaler, J., Yi, K.: Verifying computations with streaming interactive proofs. Technical Report TR10-159, ECCC Report (2010)
[15]
Fortnow, L., Lund, C.: Interactive proof systems and alternating timespace complexity. Theoretical Computer Science 113(1), 55-73 (1993)
[16]
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
[17]
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
[18]
Goldwasser, S., Kalai, Y.T.: On the (in)security of the fiat-shamir paradigm, pp. 102-113 (2003)
[19]
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: STOC, pp. 113-122 (2008)
[20]
Kilian, J.: A note on efficient zero-knowledge proofs and arguments (extended abstract). In: STOC, pp. 723-732 (1992)
[21]
Kalai, Y.T., Raz, R.: Probabilistically checkable arguments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 143-159. Springer, Heidelberg (2009)
[22]
Lund, C., Fortnow, L., Karloff, H.J., Nisan, N.: Algebraic methods for interactive proof systems. J. ACM 39(4), 859-868 (1992)
[23]
Micali, S.: Cs proofs (extended abstracts). In: FOCS, pp. 436-453 (1994)
[24]
Micali, S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253-1298 (2000)
[25]
Shamir, A.: IP = PSPACE. Journal of the ACM 39(4), 869-877 (1992)

Cited By

View all
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • (2019)VERIDProceedings of the International Conference on Internet of Things Design and Implementation10.1145/3302505.3310074(118-129)Online publication date: 15-Apr-2019
  • (2018)Secure Outsourced Matrix Computation and Application to Neural NetworksProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243837(1209-1222)Online publication date: 15-Oct-2018
  • Show More Cited By
  1. Memory delegation

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CRYPTO'11: Proceedings of the 31st annual conference on Advances in cryptology
    August 2011
    779 pages
    ISBN:9783642227912
    • Editor:
    • Phillip Rogaway

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 14 August 2011

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
    • (2019)VERIDProceedings of the International Conference on Internet of Things Design and Implementation10.1145/3302505.3310074(118-129)Online publication date: 15-Apr-2019
    • (2018)Secure Outsourced Matrix Computation and Application to Neural NetworksProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243837(1209-1222)Online publication date: 15-Oct-2018
    • (2018)Multi-collision resistance: a paradigm for keyless hash functionsProceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3188745.3188870(671-684)Online publication date: 20-Jun-2018
    • (2018)Primitives towards verifiable computationFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6148-412:3(451-478)Online publication date: 1-Jun-2018
    • (2018)Practical Homomorphic Message Authenticators for Arithmetic CircuitsJournal of Cryptology10.1007/s00145-016-9249-131:1(23-59)Online publication date: 1-Jan-2018
    • (2017)Non-interactive delegation and batch NP verification from standard computational assumptionsProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3055399.3055497(474-482)Online publication date: 19-Jun-2017
    • (2017)The Hunting of the SNARKJournal of Cryptology10.1007/s00145-016-9241-930:4(989-1066)Online publication date: 1-Oct-2017
    • (2016)Hash First, Argue LaterProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978368(1304-1316)Online publication date: 24-Oct-2016
    • (2016)Delegating RAM ComputationsProceedings, Part II, of the 14th International Conference on Theory of Cryptography - Volume 998610.1007/978-3-662-53644-5_4(91-118)Online publication date: 31-Oct-2016
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media