IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i4p152-d1129764.html
   My bibliography  Save this article

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

Author

Listed:
  • Beibei Song

    (College of Cyber Security, Jinan University, Guangzhou 511436, China)

  • Dehua Zhou

    (College of Information Science and Technology, Jinan University, Guangzhou 510632, China)

  • Jiahe Wu

    (College of Cyber Security, Jinan University, Guangzhou 511436, China)

  • Xiaowei Yuan

    (College of Cyber Security, Jinan University, Guangzhou 511436, China)

  • Yiming Zhu

    (College of Cyber Security, Jinan University, Guangzhou 511436, China)

  • Chuansheng Wang

    (College of Information Science and Technology, Jinan University, Guangzhou 510632, China)

Abstract

With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing the computation of functions, a function owner delegates a cloud server to perform the function’s computation on the input received from the user. There are three primary security concerns associated with this process: protecting function privacy for the function owner, protecting input privacy for the user and guaranteeing that the cloud server performs the computation correctly. Existing works have only addressed privately verifiable outsourcing computation with privacy or publicly verifiable outsourcing computation without input privacy or function privacy. By using the technologies of homomorphic encryption, proxy re-encryption and verifiable computation, we propose the first publicly verifiable outsourcing computation scheme that achieves both input privacy and function privacy for matrix functions, which can be extended to arbitrary multivariate polynomial functions. We additionally provide a faster privately verifiable method. Moreover, the function owner retains control over the function.

Suggested Citation

  • Beibei Song & Dehua Zhou & Jiahe Wu & Xiaowei Yuan & Yiming Zhu & Chuansheng Wang, 2023. "Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions," Future Internet, MDPI, vol. 15(4), pages 1-19, April.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:4:p:152-:d:1129764
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/4/152/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/4/152/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:4:p:152-:d:1129764. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.