INTERPOL: Information Theoretically Verifiable Polynomial Evaluation

01/10/2019
by   Saeid Sahraei, et al.
0

We study the problem of verifiable polynomial evaluation in the user-server and multi-party setups. We propose INTERPOL, an information-theoretically verifiable algorithm that allows a user to delegate the evaluation of a polynomial to a server, and verify the correctness of the results with high probability and in sublinear complexity. Compared to the existing approaches which typically rely on cryptographic assumptions, INTERPOL stands out in that it does not assume any computational limitation on the server. INTERPOL relies on decomposition of polynomial evaluation into two matrix multiplications, and injection of computation redundancy in the form of locally computed parities with secret coefficients for verification. Furthermore, by generalizing INTERPOL to a multi-party setting consisting of a network of n untrusted nodes, where each node is interested in evaluating the same polynomial, we demonstrate that we can achieve an overall computational complexity comparable to a trusted setup, while guaranteeing information-theoretic verification at each node.

READ FULL TEXT
research
02/03/2020

InfoCommit: Information-Theoretic Polynomial Commitment and Verification

We introduce InfoCommit, a protocol for polynomial commitment and verifi...
research
07/09/2019

Interactive Verifiable Polynomial Evaluation

Cloud computing platforms have created the possibility for computational...
research
10/05/2021

VESPo: Verified Evaluation of Secret Polynomials

We consider the problem of efficiently evaluating a secret polynomial at...
research
03/02/2021

The Capacity Region of Distributed Multi-User Secret Sharing

In this paper, we study the problem of distributed multi-user secret sha...
research
03/30/2021

Multi-party computation for secure polynomial control

Encrypted control systems allow to evaluate feedback laws on external se...
research
04/01/2020

On the privacy of a code-based single-server computational PIR scheme

We show that the single-server computational PIR protocol proposed by Ho...

Please sign up or login with your details

Forgot password? Click here to reset