Journal of Northeastern University Natural Science ›› 2016, Vol. 37 ›› Issue (5): 619-623.DOI: 10.12068/j.issn.1005-3026.2016.05.003

• Information & Control • Previous Articles     Next Articles

Bilinear Map-based Public Verifiable Outsourced Computation Scheme

LI Fu-xiang1, HUO Jian-qiu1, LIN Mu-qing1, ZHOU Fu-cai2   

  1. 1. School of Computer Science & Engineering, Northeastern University, Shenyang 110819, China; 2.School of Software, Northeastern University, Shenyang 110819, China.
  • Received:2015-03-11 Revised:2015-03-11 Online:2016-05-15 Published:2016-05-13
  • Contact: ZHOU Fu-cai
  • About author:-
  • Supported by:
    -

Abstract: There are two shortcomings for the existing verifiable computation schemes. One is that only the owner who outsourced the computation can verify the result, and the other is when the owner authorizes other users to verify the result, he has to send his secret key to all the authorized users. In order to overcome the problems, an outsourced computation model was proposed which supports the public verification. The description and security model were formalized and a publicly verifiable outsourced computation scheme, which is based on the bilinear map and contains three entities, was also presented. The algorithm implementation and the communication protocol were also described in details. The verification phase in the scheme does not need the owner’s secret key so it can be publicly verifiable. The scheme can be proved to satisfy unforgeability in the security model, and the security can be reduced to the hardness of the l-SBDH problem.

Key words: bilinear map, public verifiable, outsourced computation, unforgeability, verifiable computation

CLC Number: