Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Prover efficient public verification of dense or sparse/structured matrix-vector multiplication

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • Contributors:
      Calculs Algébriques et Systèmes Dynamiques (CASYS); Laboratoire Jean Kuntzmann (LJK ); Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes 2016-2019 (UGA 2016-2019 )-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes 2016-2019 (UGA 2016-2019 ); ALgorithms for coMmunicAtion SecuriTY (ALMASTY); Laboratoire d'Informatique de Paris 6 (LIP6); Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS); ANR-11-LABX-0025,PERSYVAL-lab,Systemes et Algorithmes Pervasifs au confluent des mondes physique et numérique(2011); European Project: 676541,H2020,H2020-EINFRA-2015-1,OpenDreamKit(2015)
    • بيانات النشر:
      HAL CCSD
      Springer
    • الموضوع:
      2017
    • Collection:
      Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
    • الموضوع:
    • نبذة مختصرة :
      International audience ; With the emergence of cloud computing services, computationally weak devices (Clients) can delegate expensive tasks to more powerful entities (Servers). This raises the question of verifying a result at a lower cost than that of recomputing it. This verification can be private, between the Client and the Server, or public, when the result can be verified by any third party. We here present protocols for the verification of matrix-vector multiplications, that are secure against malicious Servers. The obtained algorithms are essentially optimal in the amortized model: the overhead for the Server is limited to a very small constant factor, even in the sparse or structured matrix case; and the computational time for the public Verifier is linear in the dimension. Our protocols combine probabilistic checks and cryptographic operations, but minimize the latter to preserve practical efficiency. Therefore our protocols are overall more than two orders of magnitude faster than existing ones.
    • Relation:
      info:eu-repo/semantics/altIdentifier/arxiv/1704.02768; info:eu-repo/grantAgreement//676541/EU/Open Digital Research Environment Toolkit for the Advancement of Mathematics/OpenDreamKit; hal-01503870; https://hal.archives-ouvertes.fr/hal-01503870; https://hal.archives-ouvertes.fr/hal-01503870/document; https://hal.archives-ouvertes.fr/hal-01503870/file/report_vc_spmv.pdf; ARXIV: 1704.02768
    • الرقم المعرف:
      10.1007/978-3-319-59870-3_7
    • Rights:
      http://creativecommons.org/licenses/by-nc-nd/ ; info:eu-repo/semantics/OpenAccess
    • الرقم المعرف:
      edsbas.59841820