Visible to the public An Efficient Instance Hiding Scheme

TitleAn Efficient Instance Hiding Scheme
Publication TypeConference Paper
Year of Publication2016
AuthorsMalluhi, Qutaibah M., Shikfa, Abdullatif, Trinh, Viet Cuong
Conference NameProceedings of the Seventh Symposium on Information and Communication Technology
Date PublishedDecember 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4815-7
KeywordsComputing Theory and Privacy, delegating computation, Human Behavior, instance hiding, passive input privacy, private outsourcing of computation, pubcrawl, Resiliency, Scalability
Abstract

Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on a given input with the help of a remote computationally strong but untrusted server. The requirement is that the computation complexity of the client is much more efficient than that of f, ideally it should be in constant time or in NC0. This task has been investigated in several contexts such as instance hiding, randomized encoding, fully homomorphic encryption, garbling schemes, and verifiable scheme. In this work, we specifically consider the context where only the client has an input and gets an output, also called instance hiding. Concretely, we first give a survey of delegating computation, we then propose an efficient instance hiding scheme with passive input privacy. In our scheme, the computation complexity of the client is in NC0 and that of the server is exactly the same as the original function f. Regarding communication complexity, the client in our scheme just needs to transfer 4textbarftextbar + textbarxtextbar bits to the server, where textbarftextbar is the size of the circuit representing f and textbarxtextbar is the length of the input of f.

URLhttp://doi.acm.org/10.1145/3011077.3011100
DOI10.1145/3011077.3011100
Citation Keymalluhi_efficient_2016