VESPo: Verified Evaluation of Secret Polynomials
Jean-Guillaume Dumas,Aude Maignan,Clément Pernet,Daniel S. Roche
DOI: https://doi.org/10.48550/arXiv.2110.02022
2023-03-13
Abstract:Proofs of Retrievability are protocols which allow a Client to store data remotely and to efficiently ensure, via audits, that the entirety of that data is still intact. Dynamic Proofs of Retrievability (DPoR) also support efficient retrieval and update of any small portion of the <a class="link-external link-http" href="http://data.We" rel="external noopener nofollow">this http URL</a> propose a novel protocol for arbitrary outsourced data storage that achieves both low remote storage size and audit complexity.A key ingredient, that can be also of intrinsic interest, reduces to efficiently evaluating a secret polynomial at given public points, when the (encrypted) polynomial is stored on an untrusted <a class="link-external link-http" href="http://Server.The" rel="external noopener nofollow">this http URL</a> Server performs the evaluations and also returns associated certificates. A Client can check that the evaluations are correct using the certificates and some pre-computed keys, more efficiently than re-evaluating the <a class="link-external link-http" href="http://polynomial.Our" rel="external noopener nofollow">this http URL</a> protocols support two important features: the polynomial itself can be encrypted on the Server, and it can be dynamically updated by changing individual coefficients cheaply without redoing the entire <a class="link-external link-http" href="http://setup.Our" rel="external noopener nofollow">this http URL</a> methods rely on linearly homomorphic encryption and pairings, and our implementation shows good performance for polynomial evaluations with millions of coefficients, and efficient DPoR with terabytes of <a class="link-external link-http" href="http://data.For" rel="external noopener nofollow">this http URL</a> instance, for a 1TB database, compared to the state of art, we can reduce the Client storage by 5000x, communication size by 20x, and client-side audit time by 2x, at the cost of one order of magnitude increase in server-side audit time.
Cryptography and Security,Symbolic Computation