Refereed Delegation of Computation Using Smart Contracts
Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computati...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2024-11, Vol.21 (6), p.5208-5227 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5227 |
---|---|
container_issue | 6 |
container_start_page | 5208 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 21 |
creator | Avizheh, Sepideh Nabi, Mahmudun Safavi-Naini, Reihaneh |
description | Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation. |
doi_str_mv | 10.1109/TDSC.2024.3372848 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_3127756441</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10458259</ieee_id><sourcerecordid>3127756441</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-664711fff6d356aa993f34d9b76fe51513a9c39480f9dfca0ddfe79bac2b66ab3</originalsourceid><addsrcrecordid>eNpNkMtKAzEUQIMoWKsfILgYcD01N-8sZWpVKAi2XYfMTFKmtDM1SRf-vSnThav74NwHB6FHwDMArF_W81U1I5iwGaWSKKau0AQ0gxJjUNc554yXXEu4RXcx7nAmlWYTpL6dd8G5tpi7vdva1A19MfiiGg7HUxrLTez6bbE62JByv0_BNineoxtv99E9XOIUbRZv6-qjXH69f1avy7IhTKRSCCYBvPeipVxYqzX1lLW6lsI7Dhyo1Q3VTGGvW99Y3LbeSV3bhtRC2JpO0fO49xiGn5OLyeyGU-jzSUOBSMkFY5ApGKkmDDEG580xdPnhXwPYnAWZsyBzFmQugvLM0zjTOef-8YwrwjX9A4z4YYs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3127756441</pqid></control><display><type>article</type><title>Refereed Delegation of Computation Using Smart Contracts</title><source>IEEE Electronic Library (IEL)</source><creator>Avizheh, Sepideh ; Nabi, Mahmudun ; Safavi-Naini, Reihaneh</creator><creatorcontrib>Avizheh, Sepideh ; Nabi, Mahmudun ; Safavi-Naini, Reihaneh</creatorcontrib><description>Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2024.3372848</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Computation ; Computational modeling ; copy attack ; Costs ; Distributed ledger ; Outsourcing ; Refereed delegation of computation ; Security ; Servers ; Smart contracts ; universal composability ; verifiable computation</subject><ispartof>IEEE transactions on dependable and secure computing, 2024-11, Vol.21 (6), p.5208-5227</ispartof><rights>Copyright IEEE Computer Society 2024</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-664711fff6d356aa993f34d9b76fe51513a9c39480f9dfca0ddfe79bac2b66ab3</cites><orcidid>0000-0001-5994-133X ; 0000-0001-5111-3599 ; 0000-0002-1697-3590</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10458259$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10458259$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Avizheh, Sepideh</creatorcontrib><creatorcontrib>Nabi, Mahmudun</creatorcontrib><creatorcontrib>Safavi-Naini, Reihaneh</creatorcontrib><title>Refereed Delegation of Computation Using Smart Contracts</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.</description><subject>Computation</subject><subject>Computational modeling</subject><subject>copy attack</subject><subject>Costs</subject><subject>Distributed ledger</subject><subject>Outsourcing</subject><subject>Refereed delegation of computation</subject><subject>Security</subject><subject>Servers</subject><subject>Smart contracts</subject><subject>universal composability</subject><subject>verifiable computation</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMtKAzEUQIMoWKsfILgYcD01N-8sZWpVKAi2XYfMTFKmtDM1SRf-vSnThav74NwHB6FHwDMArF_W81U1I5iwGaWSKKau0AQ0gxJjUNc554yXXEu4RXcx7nAmlWYTpL6dd8G5tpi7vdva1A19MfiiGg7HUxrLTez6bbE62JByv0_BNineoxtv99E9XOIUbRZv6-qjXH69f1avy7IhTKRSCCYBvPeipVxYqzX1lLW6lsI7Dhyo1Q3VTGGvW99Y3LbeSV3bhtRC2JpO0fO49xiGn5OLyeyGU-jzSUOBSMkFY5ApGKkmDDEG580xdPnhXwPYnAWZsyBzFmQugvLM0zjTOef-8YwrwjX9A4z4YYs</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Avizheh, Sepideh</creator><creator>Nabi, Mahmudun</creator><creator>Safavi-Naini, Reihaneh</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0001-5994-133X</orcidid><orcidid>https://orcid.org/0000-0001-5111-3599</orcidid><orcidid>https://orcid.org/0000-0002-1697-3590</orcidid></search><sort><creationdate>20241101</creationdate><title>Refereed Delegation of Computation Using Smart Contracts</title><author>Avizheh, Sepideh ; Nabi, Mahmudun ; Safavi-Naini, Reihaneh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-664711fff6d356aa993f34d9b76fe51513a9c39480f9dfca0ddfe79bac2b66ab3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computation</topic><topic>Computational modeling</topic><topic>copy attack</topic><topic>Costs</topic><topic>Distributed ledger</topic><topic>Outsourcing</topic><topic>Refereed delegation of computation</topic><topic>Security</topic><topic>Servers</topic><topic>Smart contracts</topic><topic>universal composability</topic><topic>verifiable computation</topic><toplevel>online_resources</toplevel><creatorcontrib>Avizheh, Sepideh</creatorcontrib><creatorcontrib>Nabi, Mahmudun</creatorcontrib><creatorcontrib>Safavi-Naini, Reihaneh</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Avizheh, Sepideh</au><au>Nabi, Mahmudun</au><au>Safavi-Naini, Reihaneh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Refereed Delegation of Computation Using Smart Contracts</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>21</volume><issue>6</issue><spage>5208</spage><epage>5227</epage><pages>5208-5227</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2024.3372848</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-5994-133X</orcidid><orcidid>https://orcid.org/0000-0001-5111-3599</orcidid><orcidid>https://orcid.org/0000-0002-1697-3590</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2024-11, Vol.21 (6), p.5208-5227 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_proquest_journals_3127756441 |
source | IEEE Electronic Library (IEL) |
subjects | Computation Computational modeling copy attack Costs Distributed ledger Outsourcing Refereed delegation of computation Security Servers Smart contracts universal composability verifiable computation |
title | Refereed Delegation of Computation Using Smart Contracts |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T15%3A47%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Refereed%20Delegation%20of%20Computation%20Using%20Smart%20Contracts&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Avizheh,%20Sepideh&rft.date=2024-11-01&rft.volume=21&rft.issue=6&rft.spage=5208&rft.epage=5227&rft.pages=5208-5227&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2024.3372848&rft_dat=%3Cproquest_RIE%3E3127756441%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3127756441&rft_id=info:pmid/&rft_ieee_id=10458259&rfr_iscdi=true |