Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions
Beibei Song,
Dehua Zhou (),
Jiahe Wu,
Xiaowei Yuan,
Yiming Zhu and
Chuansheng Wang
Additional contact information
Beibei Song: College of Cyber Security, Jinan University, Guangzhou 511436, China
Dehua Zhou: College of Information Science and Technology, Jinan University, Guangzhou 510632, China
Jiahe Wu: College of Cyber Security, Jinan University, Guangzhou 511436, China
Xiaowei Yuan: College of Cyber Security, Jinan University, Guangzhou 511436, China
Yiming Zhu: College of Cyber Security, Jinan University, Guangzhou 511436, China
Chuansheng Wang: College of Information Science and Technology, Jinan University, Guangzhou 510632, China
Future Internet, 2023, vol. 15, issue 4, 1-19
Abstract:
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function’s computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.
Keywords: outsourcing computation; function privacy; input privacy; publicly verifiable computation; homomorphic encryption; proxy re-encryption (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/15/4/152/pdf (application/pdf)
https://www.mdpi.com/1999-5903/15/4/152/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:15:y:2023:i:4:p:152-:d:1129764
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().