z-logo
Premium
An improved scheme for outsourced computation with attribute‐based encryption
Author(s) -
Yang Haining,
Sun Jiameng,
Qin Jing,
Ma Jixin
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4833
Subject(s) - computer science , server , cloud computing , outsourcing , encryption , scheme (mathematics) , overhead (engineering) , verifiable secret sharing , computer security , distributed computing , information leakage , software deployment , computer network , operating system , mathematical analysis , mathematics , set (abstract data type) , political science , law , programming language
Summary With the wide deployment of cloud computing, outsourcing complicated computational tasks to cloud service providers has attracted much attention. An increasing number of clients with computationally constrained devices choose to outsource their heavy tasks to cloud servers to reduce the computational overhead in local. However, how to preserve the integrity of computational results becomes a challenge since commercial cloud servers are not trusted. Public verifiability is an effective mechanism to allow clients to verify the integrity of the results returned by the servers. Because the results are sensitive in many applications, it raises the problem of privacy leakage in the public verification process. In this paper, we propose an efficient verifiable computation scheme while keeping output privacy. The proposed scheme achieves blind verifiability such that the verifiers who have not the additional information (retrieve key) can verify the integrity of the result without learning the result. Furthermore, by combining with ( k , n )‐threshold sharing, our scheme allows the clients jointly learn the results.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here