Search International and National Patent Collections

1. (WO2018127456) PINOCCHIO / TRINOCCHIO ON AUTHENTICATED DATA

Pub. No.:    WO/2018/127456    International Application No.:    PCT/EP2017/084795
Publication Date: Fri Jul 13 01:59:59 CEST 2018 International Filing Date: Sat Dec 30 00:59:59 CET 2017
IPC: H04L 9/00
H04L 9/32
Applicants: KONINKLIJKE PHILIPS N.V.
Inventors: VEENINGEN, Meilof, Geert
Title: PINOCCHIO / TRINOCCHIO ON AUTHENTICATED DATA
Abstract:
According to an aspect, there is provided a first node for use in a system, the system comprising one or more trusted source nodes, one or more worker nodes and a verifier node, wherein the first node is configured to determine a trusted input commitment key for a trusted input to be input into a computation that is to be evaluated by the one or more worker nodes, wherein the trusted input commitment key is for use by the one or more trusted source nodes in forming a trusted input commitment of one or more trusted inputs; determine a computation evaluation key for use by the one or more worker nodes in determining a proof that a computation on one or more trusted inputs is correct and that the one or more trusted inputs were used in the computation, wherein the computation evaluation key comprises key material for one or more trusted input wires that are for inputting the one or more trusted inputs into the computation, wherein the key material is derived from a trapdoor value, one or more polynomials evaluated in a point corresponding to the trapdoor value that are independent of polynomials representing the computation, and one or more polynomials evaluated in a point corresponding to the trapdoor value that represent the computation; determine a computation verification key for use by the verifier node in verifying the result of the computation by the one or more worker nodes; and publish the trusted input commitment key, the computation evaluation key and the computation verification key. A corresponding method of operating a first node is provided. Other aspects also provide a trusted source node, a worker node and a verifier node, and methods of operating the same.