Verifiable set operations over outsourced databases

Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We study the problem of verifiable delegation of computation over outsourced data, whereby a powerful worker maintains a large data structure for a weak client in a verifiable way. Compared to the well-studied problem of verifiable computation, this setting imposes additional difficulties since the verifier also needs to check the consistency of updates succinctly and without maintaining large state. We present a scheme for verifiable evaluation of hierarchical set operations (unions, intersections and set-differences) applied to a collection of dynamically changing sets of elements from a given domain. The verification cost incurred is proportional only to the size of the final outcome set and to the size of the query, and is independent of the cardinalities of the involved sets. The cost of updates is optimal (involving O(1) modular operations per update). Our construction extends that of [Papamanthou et al., CRYPTO 2011] and relies on a modified version of the extractable collision-resistant hash function (ECRH) construction, introduced in [Bitansky et al., ITCS 2012] that can be used to succinctly hash univariate polynomials.

Original languageEnglish
Title of host publicationPublic-Key Cryptography, PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
PublisherSpringer Verlag
Pages113-130
Number of pages18
ISBN (Print)9783642546303
DOIs
StatePublished - 2014
Event17th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014 - Buenos Aires, Argentina
Duration: 26 Mar 201428 Mar 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8383 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference17th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014
Country/TerritoryArgentina
CityBuenos Aires
Period26/03/1428/03/14

Fingerprint

Dive into the research topics of 'Verifiable set operations over outsourced databases'. Together they form a unique fingerprint.

Cite this