Abstract
In this chapter we discuss approaches to verifiable computing that use fully homomorphic encryption (FHE) as a building block. First, we define homomorphic encryption and fully homomorphic encryption. Then, we describe the verifiable computing schemes using this primitive, i.e. “Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers” by Gennaro et al., “Improved Delegation of Computation Using Fully Homomorphic Encryption” by Chung et al., and “Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions” by Chen et al. Note that using these solutions the client encrypts the data before it outsources it to the server. Thus, these solutions achieve input privacy. In addition, only the client can decrypt the result, which is why also output privacy is assured. However, on the downside all fully homomorphic encryption based schemes are only privately verifiable. Furthermore, all solutions are only secure against weak adversaries and providing efficient FHE schemes is still an open research challenge.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
F. Armknecht, C. Boyd, C. Carr, K. Gjøsteen, A. Jäschke, C.A. Reuter, M. Strand, A Guide to Fully Homomorphic Encryption. Cryptology ePrint Archive, Report 2015/1192 (2015), http://eprint.iacr.org/
K. Chung, Y.T. Kalai, S.P. Vadhan, Improved delegation of computation using fully homomorphic encryption, in Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Proceedings, Santa Barbara, CA, 15–19 August 2010, pp. 483–501
R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers, in Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Proceedings, Santa Barbara, CA, 15–19 August 2010, pp. 465–482
C. Tang, Y. Chen, Efficient Non-interactive Verifiable Outsourced Computation for Arbitrary Functions. IACR Cryptology ePrint Archive (2014), p. 439
A.C. Yao, Protocols for secure computations (extended abstract), in 23rd Annual Symposium on Foundations of Computer Science, Chicago, IL, 3–5 November 1982, pp. 160–164
A.C. Yao, How to generate and exchange secrets (extended abstract), in 27th Annual Symposium on Foundations of Computer Science, Toronto, 27–29 October 1986, pp. 162–167
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Demirel, D., Schabhüser, L., Buchmann, J. (2017). Verifiable Computing from Fully Homomorphic Encryption. In: Privately and Publicly Verifiable Computing Techniques. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-53798-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-53798-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53797-9
Online ISBN: 978-3-319-53798-6
eBook Packages: Computer ScienceComputer Science (R0)