Refereed Delegation of Computation Using Smart Contracts

Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2024-11, Vol.21 (6), p.5208-5227
Hauptverfasser: Avizheh, Sepideh, Nabi, Mahmudun, Safavi-Naini, Reihaneh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5227
container_issue 6
container_start_page 5208
container_title IEEE transactions on dependable and secure computing
container_volume 21
creator Avizheh, Sepideh
Nabi, Mahmudun
Safavi-Naini, Reihaneh
description Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.
doi_str_mv 10.1109/TDSC.2024.3372848
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_3127756441</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10458259</ieee_id><sourcerecordid>3127756441</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-664711fff6d356aa993f34d9b76fe51513a9c39480f9dfca0ddfe79bac2b66ab3</originalsourceid><addsrcrecordid>eNpNkMtKAzEUQIMoWKsfILgYcD01N-8sZWpVKAi2XYfMTFKmtDM1SRf-vSnThav74NwHB6FHwDMArF_W81U1I5iwGaWSKKau0AQ0gxJjUNc554yXXEu4RXcx7nAmlWYTpL6dd8G5tpi7vdva1A19MfiiGg7HUxrLTez6bbE62JByv0_BNineoxtv99E9XOIUbRZv6-qjXH69f1avy7IhTKRSCCYBvPeipVxYqzX1lLW6lsI7Dhyo1Q3VTGGvW99Y3LbeSV3bhtRC2JpO0fO49xiGn5OLyeyGU-jzSUOBSMkFY5ApGKkmDDEG580xdPnhXwPYnAWZsyBzFmQugvLM0zjTOef-8YwrwjX9A4z4YYs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3127756441</pqid></control><display><type>article</type><title>Refereed Delegation of Computation Using Smart Contracts</title><source>IEEE Electronic Library (IEL)</source><creator>Avizheh, Sepideh ; Nabi, Mahmudun ; Safavi-Naini, Reihaneh</creator><creatorcontrib>Avizheh, Sepideh ; Nabi, Mahmudun ; Safavi-Naini, Reihaneh</creatorcontrib><description>Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2024.3372848</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Computation ; Computational modeling ; copy attack ; Costs ; Distributed ledger ; Outsourcing ; Refereed delegation of computation ; Security ; Servers ; Smart contracts ; universal composability ; verifiable computation</subject><ispartof>IEEE transactions on dependable and secure computing, 2024-11, Vol.21 (6), p.5208-5227</ispartof><rights>Copyright IEEE Computer Society 2024</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-664711fff6d356aa993f34d9b76fe51513a9c39480f9dfca0ddfe79bac2b66ab3</cites><orcidid>0000-0001-5994-133X ; 0000-0001-5111-3599 ; 0000-0002-1697-3590</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10458259$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10458259$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Avizheh, Sepideh</creatorcontrib><creatorcontrib>Nabi, Mahmudun</creatorcontrib><creatorcontrib>Safavi-Naini, Reihaneh</creatorcontrib><title>Refereed Delegation of Computation Using Smart Contracts</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.</description><subject>Computation</subject><subject>Computational modeling</subject><subject>copy attack</subject><subject>Costs</subject><subject>Distributed ledger</subject><subject>Outsourcing</subject><subject>Refereed delegation of computation</subject><subject>Security</subject><subject>Servers</subject><subject>Smart contracts</subject><subject>universal composability</subject><subject>verifiable computation</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMtKAzEUQIMoWKsfILgYcD01N-8sZWpVKAi2XYfMTFKmtDM1SRf-vSnThav74NwHB6FHwDMArF_W81U1I5iwGaWSKKau0AQ0gxJjUNc554yXXEu4RXcx7nAmlWYTpL6dd8G5tpi7vdva1A19MfiiGg7HUxrLTez6bbE62JByv0_BNineoxtv99E9XOIUbRZv6-qjXH69f1avy7IhTKRSCCYBvPeipVxYqzX1lLW6lsI7Dhyo1Q3VTGGvW99Y3LbeSV3bhtRC2JpO0fO49xiGn5OLyeyGU-jzSUOBSMkFY5ApGKkmDDEG580xdPnhXwPYnAWZsyBzFmQugvLM0zjTOef-8YwrwjX9A4z4YYs</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Avizheh, Sepideh</creator><creator>Nabi, Mahmudun</creator><creator>Safavi-Naini, Reihaneh</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0001-5994-133X</orcidid><orcidid>https://orcid.org/0000-0001-5111-3599</orcidid><orcidid>https://orcid.org/0000-0002-1697-3590</orcidid></search><sort><creationdate>20241101</creationdate><title>Refereed Delegation of Computation Using Smart Contracts</title><author>Avizheh, Sepideh ; Nabi, Mahmudun ; Safavi-Naini, Reihaneh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-664711fff6d356aa993f34d9b76fe51513a9c39480f9dfca0ddfe79bac2b66ab3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computation</topic><topic>Computational modeling</topic><topic>copy attack</topic><topic>Costs</topic><topic>Distributed ledger</topic><topic>Outsourcing</topic><topic>Refereed delegation of computation</topic><topic>Security</topic><topic>Servers</topic><topic>Smart contracts</topic><topic>universal composability</topic><topic>verifiable computation</topic><toplevel>online_resources</toplevel><creatorcontrib>Avizheh, Sepideh</creatorcontrib><creatorcontrib>Nabi, Mahmudun</creatorcontrib><creatorcontrib>Safavi-Naini, Reihaneh</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Avizheh, Sepideh</au><au>Nabi, Mahmudun</au><au>Safavi-Naini, Reihaneh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Refereed Delegation of Computation Using Smart Contracts</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>21</volume><issue>6</issue><spage>5208</spage><epage>5227</epage><pages>5208-5227</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Outsourcing computation enables a weak client to expand its computational power as the need arises. A basic requirement of outsourcing computation is the guarantee that the computation result is correct. Cryptographic solutions that provide verifiability for the computation result when the computation is outsourced to a single server, are complex and fragile. We consider the intuitive approach of verifiable computation, called verifiable computation by replication, when the computation is replicated on multiple servers, and a referee decides the result of the final computation using the outputs of all servers. We consider the case when a smart contact is used as the referee. We propose a security model in the Universal Composability (UC) framework of Canetti, and design a 2-server and an n-server protocol with proved security in our model. Our protocols build on the Refereed Delegation of Computation (RDoC) framework of Canetti, Riva, and Rothblum, underline the challenges of using a smart contract as a referee, and address those challenges in the designed protocols. We give the efficiency analysis of the protocols, provide a proof of concept implementation for our protocols using Ethereum smart contact, and give concrete cost values for an example computation.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2024.3372848</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-5994-133X</orcidid><orcidid>https://orcid.org/0000-0001-5111-3599</orcidid><orcidid>https://orcid.org/0000-0002-1697-3590</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2024-11, Vol.21 (6), p.5208-5227
issn 1545-5971
1941-0018
language eng
recordid cdi_proquest_journals_3127756441
source IEEE Electronic Library (IEL)
subjects Computation
Computational modeling
copy attack
Costs
Distributed ledger
Outsourcing
Refereed delegation of computation
Security
Servers
Smart contracts
universal composability
verifiable computation
title Refereed Delegation of Computation Using Smart Contracts
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T15%3A47%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Refereed%20Delegation%20of%20Computation%20Using%20Smart%20Contracts&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Avizheh,%20Sepideh&rft.date=2024-11-01&rft.volume=21&rft.issue=6&rft.spage=5208&rft.epage=5227&rft.pages=5208-5227&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2024.3372848&rft_dat=%3Cproquest_RIE%3E3127756441%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3127756441&rft_id=info:pmid/&rft_ieee_id=10458259&rfr_iscdi=true