Papers
Topics
Authors
Recent
Search
2000 character limit reached

Secure Point Extraction Protocol

Updated 10 December 2025
  • Secure Point Extraction Protocol is a cryptographic framework that enables clients to outsource secret polynomial evaluations while maintaining information-theoretic confidentiality and verifiability.
  • It leverages bilinear pairings and linearly homomorphic encryption to efficiently compute and verify polynomial proofs, even for large-scale or terabyte-level data.
  • The protocol supports dynamic coefficient updates and robust verifiable evaluation using rigorous security reductions based on discrete logarithm assumptions and t-BSDH.

A Secure Point Extraction Protocol enables a client to outsource a secret polynomial f(X)=i=0daiXiFp[X]f(X)=\sum_{i=0}^d a_i X^i \in \mathbb{F}_p[X] to an untrusted server, have the polynomial evaluated at public points, and efficiently verify the results while maintaining information-theoretic confidentiality of the coefficients {ai}\{a_i\}. This protocol, formalized in the VDPE (Verifiable Dynamic Polynomial Evaluation) framework, supports dynamic coefficient updates and underpins efficient Dynamic Proofs of Retrievability (DPoR) for large-scale remote data storage. The construction presented in the VESPo protocol leverages linearly homomorphic encryption, bilinear pairings, and polynomial-masking techniques to achieve soundness, privacy, and performance even at terabyte and million-term polynomial scales (Dumas et al., 2021).

1. System Entities and Security Definitions

The protocol involves two parties: a client C\mathcal{C} that holds the secret polynomial, and a server S\mathcal{S} that stores an encrypted (and masked) version of the polynomial along with public evaluation data. The threat model assumes a single malicious server that may arbitrarily deviate from the protocol but is computationally bounded by discrete logarithm-type hardness assumptions.

The primary goals are:

  • Confidentiality: Coefficients {ai}\{a_i\} remain hidden from S\mathcal{S}.
  • Soundness: Any incorrect polynomial evaluation or proof from S\mathcal{S} will be detected by C\mathcal{C}, except with negligible probability.
  • Privacy: No adversary (even interacting with setup, update, and evaluation APIs) can distinguish between two polynomials of the same degree.

Correctness, soundness (using a tt-BSDH reduction), and privacy (using DLM) are guaranteed through the sequence of algorithms: Setup\text{Setup}, Read\text{Read}, Update\text{Update}, Eval\text{Eval}, Verify\text{Verify} (Dumas et al., 2021).

2. Cryptographic Foundations

Bilinear Pairings and Groups

The scheme operates in prime-order groups (G1,G2,GT)(\mathbb{G}_1, \mathbb{G}_2, \mathbb{G}_T) with generators g1G1g_1\in\mathbb{G}_1, g2G2g_2\in\mathbb{G}_2, and an efficiently computable, non-degenerate pairing function e:G1×G2GTe: \mathbb{G}_1 \times \mathbb{G}_2 \to \mathbb{G}_T satisfying e(g1,g2)=gTe(g_1,g_2) = g_T.

Linearly Homomorphic Encryption (LHE)

A public-key LHE scheme (KeyGen,E,D)(\mathsf{KeyGen}, E, D) over Zp\mathbb{Z}_p supports:

D(E(m1)E(m2))=m1+m2,D(E(m1)c)=m1cD(E(m_1)\cdot E(m_2)) = m_1+m_2, \quad D(E(m_1)^c) = m_1\cdot c

An example instantiation is Paillier encryption modulo an RSA composite NN with appropriate size constraints.

Exponent Vector Algebra

Vectors W=[W0,...,Wd]GW = [W_0, ..., W_d] \in \mathbb{G} and x=[x0,...,xd]Zpd+1x = [x_0, ..., x_d] \in \mathbb{Z}_p^{d+1} define a "dot-product in exponents" as Wx=i=0dWixiW\odot x = \prod_{i=0}^d W_i^{x_i}. Similarly, for an LHE ciphertext vector, gAx=E(iAixi)g^A\boxdot x = E(\sum_i A_i x_i).

Difference-Polynomial Identity

The central evaluation check uses the identity:

Qf(Y,X)=f(Y)f(X)YXQ_f(Y,X)=\frac{f(Y)-f(X)}{Y-X}

yielding, in exponent form,

gTf(s)=gTf(r)e(g1sr,g2Qf(s,r))g_T^{f(s)} = g_T^{f(r)} \cdot e(g_1^{s-r}, g_2^{Q_f(s,r)})

This underpins the succinct verifiable proof of correct evaluation.

3. Protocol Initialization: Setup Phase

Upon input of the secret polynomial, the client executes:

  1. Key generation: (pk,sk)KeyGen(1λ)(pk, sk) \leftarrow \mathsf{KeyGen}(1^\lambda) for LHE.
  2. Randomness sampling: sFp{0,1}s\in\mathbb{F}_p\setminus\{0,1\}, αFp2{0}\alpha\in\mathbb{F}_p^2\setminus\{0\}, βFp2\beta\in\mathbb{F}_p^2, and a 2×22\times2 invertible ΦFp2×2\Phi\in\mathbb{F}_p^{2\times2} with (sΦI)(s\Phi-I) invertible.
  3. Coefficient masking: aˉi=aiα+ΦiβFp2\bar a_i = a_i\alpha + \Phi^i\beta\in\mathbb{F}_p^2.
  4. Encryption: W=[E(a0),...,E(ad)]CTd+1W = [E(a_0), ..., E(a_d)] \in \mathsf{CT}^{d+1}.
  5. Auxiliary data computation: Powers of ss for evaluation, masked exponent generators Hi=g2aˉiH_i = g_2^{\bar a_i}, and commitment K=gTfˉ(s)\mathcal{K} = g_T^{\bar f(s)}.
  6. Optionally, a Merkle tree over WW is constructed for integrity in "Read".

Storage Assignment

Entity Data Held
Server (S\mathcal{S}) pk,W,S,H,TWpk, W, S, H, T_W
Client (C\mathcal{C}) sk,s,α,β,Φ,K,rWsk, s, \alpha, \beta, \Phi, \mathcal{K}, r_W

At completion, all evaluation and verification subsequent to setup can proceed with these state variables.

4. Secure Evaluation and Verification Workflow

Evaluation Phase

Given a public challenge point rFpr\in\mathbb{F}_p:

  • From S\mathcal{S}:

1. Compute the LHE-encrypted evaluation ζ=W[1,r,r2,...,rd]=E(i=0dairi)\zeta = W\boxdot[1, r, r^2, ..., r^d] = E(\sum_{i=0}^d a_i r^i). 2. Produce a succinct pairing-based proof ξ\xi using the masked exponents and difference-polynomial identity, as per Algorithm 4.4.

  • Server sends (ζ,ξ)(\zeta, \xi) to the client.

Verification Phase

Upon receipt:

  1. Decryption: z=Dsk(ζ)z = D_{sk}(\zeta), representing f(r)f(r).
  2. Auxiliary computation: Calculate cc via the "Projected Matrix Geometric Sum" using Algorithm 5.2.
  3. Pairing checks: For j=1,2j=1,2,

ξ[j]srgTα[j]z+c[j]=?K[j]\xi[j]^{s-r}\cdot g_T^{\alpha[j] z + c[j]} \stackrel{?}{=} \mathcal{K}[j]

If both equalities hold, zz is accepted as f(r)f(r); otherwise, reject.

5. Dynamic Polynomial Updates

The protocol supports efficient, non-interactive updates to individual coefficients aiai+δa_i\mapsto a_i+\delta, preserving future correctness for evaluations and verifications without full reinitialization.

  • Client computes: eδ=E(δ)e_\delta = E(\delta), Δ=g2αδ\Delta = g_2^{\alpha\delta}
  • Update message: Client sends (i,eδ,Δ)(i, e_\delta, \Delta) to the server.
  • Server updates:

1. Ciphertext WiWieδW_i \leftarrow W_i \cdot e_\delta 2. Masked exponent HiHiΔH_i \leftarrow H_i \cdot \Delta (coordinate-wise)

  • Client updates: K[j]K[j]e(g1,Δ[j]si)\mathcal{K}[j] \leftarrow \mathcal{K}[j] \cdot e(g_1, \Delta[j]^{s^i})

All update steps require O(1)O(1) group operations for affected components only.

6. Security Reductions and Complexity

The protocol’s soundness is tightly reduced to the tt-BSDH problem in the pairing groups; thus, a successful forgery yields e(g1,g2)1/(sr)e(g_1, g_2)^{1/(s-r)}. Extraction (for PoR) reduces to solving discrete-log via the MDDH family and a "one-coordinate hidden" argument. Privacy derives from the DLM assumption on the masked HiH_i combined with Paillier encryption’s semantic security.

The complexity profile is as follows (degree dd):

Aspect Asymptotic Complexity
Client storage O(1)O(1) (only secrets {s,α,β,Φ,K}\{s,\alpha,\beta,\Phi,\mathcal{K}\})
Server storage O(d)O(d) (ciphertexts and group elements)
Per evaluation communication O(1)O(1) (one LHE ciphertext + two group elements)
Client verification time O(1)O(1) (including pairings, field ops, decryption)
Server evaluation time O(d)O(d), parallelizable (O(d/q)O(d/q) for qq cores)

Empirical Benchmarks

On a 2.6 GHz core with 254-bit pairing and 2048-bit Paillier:

Degree dd Server Eval (1 core) Server Eval (4 cores) Client Verify
28=2562^8=256 0.20 s (ζ\zeta) + 0.15 s (ξ\xi) 0.07 s + 0.05 s 0.7 ms
217=1310722^{17}=131072 60.8 s + 39.0 s 16.2 s + 10.9 s 0.7 ms

For a 1 TB database under DPoR instantiation, client audit is <7<7 ms, persistent client storage <1<1 KB, communication <300<300 KB, and server-side audit under a few minutes on 12 cores, incurring only 0.08% additional storage (Dumas et al., 2021).

7. Context, Applicability, and Future Prospects

Secure Point Extraction Protocols, and specifically the VESPo realization, provide verifiable and privacy-preserving outsourced polynomial evaluation with minimal client involvement. Leveraging cryptographic primitives such as bilinear pairings and LHE, they overcome previous limitations of static polynomial commitments, enabling scalability to million-term polynomials and terabyte-scale data via DPoR.

A plausible implication is that such protocols will underpin practical proof systems in remote storage platforms and privacy-preserving cloud computation. The ability to support dynamic updates and efficient audits, coupled with rigorous security reductions and real-world efficiency, suggests suitability for large distributed storage or verifiable outsourced computation scenarios. Open directions include optimizing server-side performance and extending the approach to richer function classes beyond polynomials (Dumas et al., 2021).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Secure Point Extraction Protocol.