[Resource Topic] 2021/1118: THC: Practical and Cost-Effective Verification of Delegated Computation

Welcome to the resource topic for 2021/1118

Title:
THC: Practical and Cost-Effective Verification of Delegated Computation

Authors: Pablo Rauzy, Ali Nehme

Abstract:

Homomorphic cryptography is used when computations are delegated to an untrusted third-party. However, there is a discrepancy between the untrustworthiness of the third-party and the silent assumption that it will perform the expected computations on the encrypted data. This may raise serious privacy concerns, for example when homomorphic cryptography is used to outsource resource-greedy computations on personal data (e.g., from an IoT device to the cloud). In this paper we show how to cost-effectively verify that the delegated computation corresponds to the expected sequence of operations, thus drastically reducing the necessary level of trust in the third-party. Our approach is based on the well-known modular extension scheme: it is transparent for the third-party and it is not tied to a particular homomorphic cryptosystem nor depends on newly introduced (and thus less-studied) cryptographic constructions. We provide a proof-of-concept implementation, THC (for “trustable homomorphic computation”), which we use to perform security and performance analyses. We then demonstrate its practical usability, in the case of a toy electronic voting system.

ePrint: https://eprint.iacr.org/2021/1118

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .