TY - GEN
T1 - On Black-Box Verifiable Outsourcing
AU - Agarwal, Amit
AU - Alamati, Navid
AU - Khurana, Dakshita
AU - Raghuraman, Srinivasan
AU - Rindal, Peter
N1 - Publisher Copyright:
© 2023, International Association for Cryptologic Research.
PY - 2023
Y1 - 2023
N2 - We study verifiable outsourcing of computation in a model where the verifier has black-box access to the function being computed. We introduce the problem of oracle-aided batch verification of computation (OBVC) for a function class F. This allows a verifier to efficiently verify the correctness of any f∈ F evaluated on a batch of n instances x1, …, xn, while only making λ calls to an oracle for f (along with O(nλ) calls to low-complexity helper oracles), for security parameter λ. We obtain the following positive and negative results: We build OBVC protocols for the class of all functions that admit random-self-reductions. Some of our protocols rely on homomorphic encryption schemes.We show that there cannot exist OBVC schemes for the class of all functions mapping λ -bit inputs to λ -bit outputs, for any n= poly(λ).1 (1 The authors grant IACR a non-exclusive and irrevocable license to distribute the article under the https://creativecommons.org/licenses/by-nc/3.0/.)
AB - We study verifiable outsourcing of computation in a model where the verifier has black-box access to the function being computed. We introduce the problem of oracle-aided batch verification of computation (OBVC) for a function class F. This allows a verifier to efficiently verify the correctness of any f∈ F evaluated on a batch of n instances x1, …, xn, while only making λ calls to an oracle for f (along with O(nλ) calls to low-complexity helper oracles), for security parameter λ. We obtain the following positive and negative results: We build OBVC protocols for the class of all functions that admit random-self-reductions. Some of our protocols rely on homomorphic encryption schemes.We show that there cannot exist OBVC schemes for the class of all functions mapping λ -bit inputs to λ -bit outputs, for any n= poly(λ).1 (1 The authors grant IACR a non-exclusive and irrevocable license to distribute the article under the https://creativecommons.org/licenses/by-nc/3.0/.)
UR - http://www.scopus.com/inward/record.url?scp=85178600625&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85178600625&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-48615-9_6
DO - 10.1007/978-3-031-48615-9_6
M3 - Conference contribution
AN - SCOPUS:85178600625
SN - 9783031486142
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 158
EP - 187
BT - Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings
A2 - Rothblum, Guy
A2 - Wee, Hoeteck
PB - Springer
T2 - 21st International conference on Theory of Cryptography Conference, TCC 2023
Y2 - 29 November 2023 through 2 December 2023
ER -