Program Result Checking against Adaptive Programs and in Cryptographic Settings

نویسندگان

  • Manuel Blum
  • Michael Luby
  • Ronitt Rubinfeld
چکیده

The theory of program result checking introduced in Blum] allows one to check that a program P correctly computes the function f on input x. The checker may use P 's outputs on other inputs to help it check that P (x) = f(x). In this setting, P is always assumed to be a xed program, whose output on input x is a function P (x). We extend the theory to check a program P which returns a result on input x that may depend on previous questions asked of P. We call a checker that works for such a program an adaptive checker. We consider the case where there is an adaptive program that supposedly computes f running on each of several noninteracting machines. We design adaptive checkers that work for a constant number of independent and noninteracting programs. We also consider the following cryptographic scenario: A user wants to evaluate function f on input x using program P running on another machine. As in checking, the user does not trust the program to be correct. The additional requirement is that the user wants to let the other machine know as little information as possible about x from the questions asked of the program P (for example, the user may want the program to be able to learn at most the input size) as in Abadi Feigenbaum Kilian] Beaver Feigenbaum]. We call a program that satisses the above constraints a private checker. As is the case for adaptive checking, we consider the case where there is a program that supposedly computes f on each of several noninteracting machines. We design private checkers that work for a constant number of independent and noninteracting programs. The adaptive and private checkers given are general techniques that work for a variety of numerical problems, including integer multiplication, modular multiplication, matrix multiplication , the mod function, integer division, modular exponentiation and polynomial multiplication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Program Result Checking against Adaptive Programs and in Cryptographic Settings (extended Abstract)

The theory of program result checking introduced in Blum allows one to check that a program P correctly computes the function f on input x The checker may use P s outputs on other inputs to help it check that P x f x In this setting P is always assumed to be a xed program whose output on input x is a function P x We extend the theory to check a program P which returns a result on input x that m...

متن کامل

Vineland Adaptive Behavior Scale for People with Mental Retardation, Emotional Disorders, and Behavioral Problems

Objectives: The Vineland Adaptive Behavior Scale-II is useful in assessing an individual’s daily functioning. They can be used as an evaluation and diagnostic tool for individuals who are mentally retarded or individuals with other handicaps. Methods: To determine the efficacy of VABS in clinical settings, 3 cases with mental retardation and behavioral or emotional problems were evaluated ac...

متن کامل

A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs

Several tools and approaches for proving noninterference properties for Java and other languages exist. Some of them have a high degree of automation or are even fully automatic, but overapproximate the actual information flow, and hence, may produce false positives. Other tools, such as those based on theorem proving, are more precise, but need more interaction, and hence, analysis is time-con...

متن کامل

A Proof Technique for Noninterference In Open Systems: An extended version

In [3], a framework has been proposed which allows tools that can check standard noninterference properties but a priori cannot deal with cryptography, in particular probabilities and polynomially bounded adversaries, to establish cryptographic indistinguishability properties, such as privacy properties, for Java programs. The framework combines techniques from program analysis and cryptography...

متن کامل

Modular Model Checking of Dynamically Adaptive Programs

Increasingly, software must dynamically adapt its behavior in response to changes in its runtime environment and user require-ments in order to upgrade services, to harden security, or to improve performance. In order for adaptive software to be used insafety critical systems, they must be trusted. In this paper, we introduce a sound approach for modularly verifying whether anadapti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989