COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Microsoft Research Cambridge, public talks > Vector Commitments with Efficient Protocols for Privacy-preserving Smart Billing Applications
Vector Commitments with Efficient Protocols for Privacy-preserving Smart Billing ApplicationsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins. This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending In privacy-preserving smart billing applications, users receive signed readings from smart meters, calculate the total fee that should be paid and prove to service providers the correctness of the fee calculation without disclosing any further information. To calculate the total fee and prove its correctness, users receive a signed tariff policy from service providers. Existing protocols allow users to prove efficiently the correctness of the fee calculation when tariff policies are simple, meaning that the price to be paid does not depend on users’ past consumption and is specified by a single service provider. However, when the price due depends on several policies signed by different entities, the proof of correctness involves a computation cost linear in the amount of entities. History-dependent tariff policies involve recalculations on meter readings. We propose a method to efficiently calculate the total fee and prove its correctness when complex tariff policies are applied. Basically, it consists in creating an intermediate table that stores partial calculations. The intermediate table allows to speed up the computation of the proof of correctness and, when the usage of the intermediate table surpasses a threshold, the cost of creating the intermediate table is amortized. We show how to build intermediate tables based on a novel primitive we call vector commitments. Essentially, vector commitments are commitments to a vector of values that can be opened to one of the values with cost independent of the size of the vector. We define vector commitments and propose several constructions based on different security assumptions. This talk is part of the Microsoft Research Cambridge, public talks series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsMental Health Week 2013 The Cambridge University Energy Network (CUEN) First Cambridge-Nanzan Syntax WorkshopOther talksTowards a whole brain model of perceptual learning From dry to wet granular media Political Thought, Time and History: An International Conference Satellite Applications Catapult Quickfire Talks Rhys Jones: Temporal Claustrophobia at the Continental Congress, 1774-1776 Making Refuge: Flight A rose by any other name A feast of languages: multilingualism in neuro-typical and atypical populations To be confirmed Speculations about homological mirror symmetry for affine hypersurfaces An exploration of grain growth & deformation in zirconium |