Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data

Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing more trustworthy. Recent schemes enable a verifier with limited resources to delegate large computations and verify their outcome based on succinct arguments: verification complexity is linear in the size of the inputs and outputs (not the size of the computation). However, cloud computing also often involves large amounts of data, which may exceed the local storage and I/O capabilities of the verifier, and thus limit the use of VC. In this paper, we investigate multi-relation hash & prove schemes for verifiable computations that operate on succinct data hashes. Hence, the verifier delegates both storage and computation to an untrusted worker. She uploads data and keeps hashes; exchanges hashes with other parties; verifies arguments that consume and produce hashes; and selectively downloads the actual data she needs to access. Existing instantiations that fit our definition either target restricted classes of computations or employ relatively inefficient techniques. Instead, we propose efficient constructions that lift classes of existing arguments schemes for fixed relations to multi-relation hash & prove schemes. Our schemes (1) rely on hash algorithms that run linearly in the size of the input; (2) enable constant-time verification of arguments on hashed inputs; (3) incur minimal overhead for the prover. Their main benefit is to amortize the linear cost for the verifier across all relations with shared I/O. Concretely, compared to solutions that can be obtained from prior work, our new hash & prove constructions yield a 1,400x speed-up for provers. We also explain how to further reduce the linear verification costs by partially outsourcing the hash computation itself, obtaining a 480x speed-up when applied to existing VC schemes, even on single-relation executions.
Original languageEnglish
Title of host publicationProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016
Pages1304-1316
Number of pages13
ISBN (Electronic)978-1-4503-4139-4
DOIs
Publication statusPublished - 24 Oct 2016
Event23rd ACM Conference on Computer and Communications Security - Hofburg Palace, Vienna, Austria
Duration: 24 Oct 201628 Oct 2016
https://www.sigsac.org/ccs/CCS2016/index.html
https://www.sigsac.org/ccs/CCS2016/

Conference

Conference23rd ACM Conference on Computer and Communications Security
Abbreviated titleACM CCS 2016
Country/TerritoryAustria
CityVienna
Period24/10/1628/10/16
Internet address

Fingerprint

Dive into the research topics of 'Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data'. Together they form a unique fingerprint.

Cite this