Here we plot the time necessary for the verify pro-
cess, as showing in Figure 8, our verify algorithms is
much more efficient than the original MVC scheme.
We believe these numbers show that our protocol is
applicable in a practical setting.
Unfortunately, since we used the Pollard’s kanga-
roo algorithm (Pollard, 1978) to solve the discrete log
problem in the decryption. The time we spend in the
decryption process is still relatively long, it is accept-
able when the input length is shorter than 50-bit.
Figure 8: Comparison with (Choi et al., 2013).
5 CONCLUSION
In this paper, we provide a general transformation
from HPRA to MVC. We also implemented an MVC
scheme for computing the linear combinations of vec-
tors over a finite field. To our best knowledge, this is
the first implementable MVC scheme for outsourcing
specific computation to date. Our implementation re-
quires the computation of discrete logarithms. How
to avoid the the expensive operations of computing
discrete logarithms is an open question for further re-
search.
ACKNOWLEDGEMENTS
This work is supported by National Natural Science
Foundation of China (Grant No. 61602304). The
authors thank Zidong Lu for useful helping provided
in experiment environment configuration and C pro-
gramming.
REFERENCES
Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., and
Virza, M. (2013). Snarks for c: Verifying program ex-
ecutions succinctly and in zero knowledge. In Annual
Cryptology Conference, pages 90–108. Springer.
Ben-Sasson, E., Chiesa, A., Tromer, E., and Virza, M.
(2014). Succinct non-interactive zero knowledge for a
von neumann architecture. In 23rd USENIX Security
Symposium, pages 781–796.
Benabbas, S., Gennaro, R., and Vahlis, Y. (2011). Veri-
fiable delegation of computation over large datasets.
In Annual Cryptology Conference, pages 111–131.
Springer.
Braun, B., Feldman, A. J., Ren, Z., Setty, S., Blumberg,
A. J., and Walfish, M. (2013). Verifying computations
with state. In Proceedings of the Twenty-Fourth ACM
Symposium on Operating Systems Principles, pages
341–357. ACM.
Choi, S. G., Katz, J., Kumaresan, R., and Cid, C. (2013).
Multi-client non-interactive verifiable computation. In
Theory of Cryptography Conference, pages 499–518.
Springer.
Cormode, G., Mitzenmacher, M., and Thaler, J. (2012).
Practical verified computation with streaming interac-
tive proofs. In Proceedings of the 3rd Innovations in
Theoretical Computer Science Conference, pages 90–
112. ACM.
Derler, D., Ramacher, S., and Slamanig, D. (2017). Ho-
momorphic proxy re-authenticators and applications
to verifiable multi-user data aggregation. In Inter-
national Conference on Financial Cryptography and
Data Security, pages 124–142. Springer.
Fiore, D., Mitrokotsa, A., Nizzardo, L., and Pagnin, E.
(2016). Multi-key homomorphic authenticators. In In-
ternational Conference on the Theory and Application
of Cryptology and Information Security, pages 499–
530. Springer.
Gennaro, R., Gentry, C., and Parno, B. (2010). Non-
interactive verifiable computing: Outsourcing com-
putation to untrusted workers. In Annual Cryptology
Conference, pages 465–482. Springer.
Goldwasser, S., Gordon, S. D., Goyal, V., Jain, A., Katz, J.,
Liu, F.-H., Sahai, A., Shi, E., and Zhou, H.-S. (2014).
Multi-input functional encryption. In Annual Interna-
tional Conference on the Theory and Applications of
Cryptographic Techniques, pages 578–602. Springer.
Gordon, S. D., Katz, J., Liu, F.-H., Shi, E., and Zhou, H.-
S. (2015). Multi-client verifiable computation with
stronger security guarantees. In Theory of Cryptog-
raphy Conference, pages 144–168. Springer.
Papamanthou, C., Shi, E., and Tamassia, R. (2013). Signa-
tures of correct computation. In Theory of Cryptogra-
phy Conference, pages 222–242. Springer.
Parno, B., Howell, J., Gentry, C., and Raykova, M. (2013).
Pinocchio: Nearly practical verifiable computation. In
2013 IEEE Symposium on Security and Privacy, pages
238–252. IEEE.
Pollard, J. M. (1978). Monte carlo methods for index
computation mod p. Mathematics of computation,
32(143):918–924.
Schabh
¨
user, L., Butin, D., and Buchmann, J. (2019). Con-
text hiding multi-key linearly homomorphic authenti-
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
204