X Optimal Contracts for Outsourced Computation
نویسندگان
چکیده
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., " lazy-but-honest " contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and " redundancy ". Our contracts provably minimize the expense of the outsourcer (principal) while guaranteeing correct computation. Furthermore, we incorporate practical restrictions of the maximum enforceable fine, limited and/or costly auditing, and bounded budget of the outsourcer. By examining the optimal contracts, we provide insights on how resources should be utilized when auditing capacity and enforceability are limited. Finally, we present a lightweight cryptographic implementation of the contracts and discuss a comparison across different implementations of auditing in outsourced computation.
منابع مشابه
Optimal Contracts for Outsourced Computation
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest” contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and “redundancy”. Our co...
متن کاملIncentive Engineering for Outsourced Computation in the Face of Collusion
One of the major security concerns in outsourced computation is whether the computation is performed honestly. Although cryptographically verifiable computation promises (almost) certain detection of dishonest computations, its computational complexity is still a distance away from practical, and only justifies its use in mission-critical applications, e.g., where there is suspicion of maliciou...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملModerating Effect of Buyer-Supplier Trust on the Relationship between Outsourced Formal Contracts and Supplier Delivery Performance: An Empirical Study of Public Sector Procurement
This study examines the moderating effect of buyer-supplier trust on the relationship between outsourced formal contracts and supplier delivery performance in the domain of public sector procurement. In so doing, we extend the paradigm that formal contracts and relational governance mechanism function as complements rather than substitutes. Using a cross sectional data from a survey of 612 staf...
متن کاملAttribute Based Encryption Schemes for Efficient Verifiable Data Sharing
Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...
متن کامل