How To Privately Utilize Untrustworthy Computing Power

Yu Yu,Jussipekka Leiwo,Benjamin Premkumar
2006-01-01
Abstract:Suppose that a weak power device Alice (e.g. a smart card) wants to compute p(x) for her private program p and input x but lacks the resources to do it, then how can she utilize untrustworthy computing power without revealing anything substantial about the computation? In this paper, we present a solution that allows an untrustworthy Bob to execute the program for Alice in such an oblivious way that none of x, p and p(x) is revealed to Bob. In addition, if Bob cheats Alice by giving a fake result, Alice will be able to detect it with an overwhelming probability. We describe a procedure of encrypting a general program as well as explore the privacy preserving properties. Our solution is generic for deterministic polynomial-time programs and it provides a compiler for Alice and a virtual machine for Bob.
What problem does this paper attempt to address?