Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. In: Lecture Notes in Computer Science (14324) pp. 73-86. From: NordSEC 2023: Nordic Conference on Secure IT Systems, 16-17 November 2023, Oslo, Norway.

[img] PDF
Restricted to Repository staff only

View at Publisher Website: https://doi.org/10.1007/978-3-031-47748-...
 
1


Abstract

Distributed oblivious polynomial evaluation (DOPE) is a special case of two-party computation where the sender party P1 holds a polynomial f(x) of degree k and the receiver party P2 has a value α. They wish to perform a secure computation with the help of n designated cloud servers such that P2 obtains the value f(α) while the privacy of their inputs is maintained.

We present the first fair DOPE scheme using Bitcoin deposit transactions in the presence of n cloud servers where n is independent of the polynomial degree k. The fairness property ensures that an honest server gains the reward for conducting a computation service while a corrupt server has to pay some penalty amount to an honest party. Our protocol consists of two separate phases: setup and computation. The cloud servers are involved with P1 in the setup phase while P2 communicates with the servers in the computation phase which means that the actual computation can be implemented at any time after the setup phase. Any corrupt party/server can be detected using the non-interactive Pedersen’s commitment scheme. Our protocol preserves the security against an active adversary corrupting a coalition of P1 and at most t cloud servers in the setup phase and a coalition of up to t servers in the computation phase in the presence of honest majority of the servers. The communication complexity is bounded to O(kt) which is the same as that in the previous DOPE studies while the fairness feature is also achieved in our scheme.

Item ID: 81369
Item Type: Conference Item (Research - E1)
ISBN: 978-3-031-47748-5
Copyright Information: © 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
Date Deposited: 13 Dec 2023 22:28
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 40%
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460403 Data security and protection @ 30%
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified @ 30%
SEO Codes: 22 INFORMATION AND COMMUNICATION SERVICES > 2201 Communication technologies, systems and services > 220199 Communication technologies, systems and services not elsewhere classified @ 50%
22 INFORMATION AND COMMUNICATION SERVICES > 2299 Other information and communication services > 229999 Other information and communication services not elsewhere classified @ 50%
Downloads: Total: 1
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page