Interactive verifiable polynomial evaluation

Saeid Sahraei, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Cloud computing platforms have created the possibility for computationally limited users to delegate demanding tasks to strong but untrusted servers. Verifiable computing algorithms help build trust in such interactions by enabling the server to provide a proof of correctness of his results which the user can check very efficiently. In this article, we present a doubly-efficient interactive algorithm for verifiable polynomial evaluation. Unlike the mainstream literature on verifiable computing, the soundness of our algorithm is information-theoretic and cannot be broken by a computationally unbounded server. By relying on basic properties of error correcting codes, our algorithm enforces a dishonest server to provide false results to problems which become progressively easier to verify. After roughly log d rounds, the user can verify the response of the server against a look-up table that has been pre-computed during an initialization phase. For a polynomial of degree d, we achieve a user complexity of O(dε), a server complexity of O(d1+ε), a round complexity of O(log d) and an initialization complexity of O(d1+ε).

Original languageEnglish (US)
Article number9340357
Pages (from-to)317-325
Number of pages9
JournalIEEE Journal on Selected Areas in Information Theory
Volume2
Issue number1
DOIs
StatePublished - Mar 2021

Bibliographical note

Publisher Copyright:
© 2021 IEEE.

Keywords

  • Information-theoretic security
  • Interactive proof systems
  • Sub-linear complexity
  • Verifiable computing

Fingerprint

Dive into the research topics of 'Interactive verifiable polynomial evaluation'. Together they form a unique fingerprint.

Cite this