搜索结果: 1-14 共查到“军事学 verifiable computation”相关记录14条 . 查询时间(0.123 秒)
Stateful Multi-Client Verifiable Computation
Byzantine emulation verifiable computation authenticated data types
2017/9/25
This paper develops a cryptographic protocol for outsourcing arbitrary stateful computation among multiple clients to an untrusted server, while guaranteeing integrity of the data. The clients communi...
Verifiable Computation in Multiparty Protocols with Honest Majority
Secure multiparty computation verifiable computation linear PCP
2016/1/26
We present a generic method for turning passively secure
protocols into protocols secure against covert attacks. The method adds
a post-execution verification phase to the protocol that allows a mis...
Efficiently Verifiable Computation on Encrypted Data
verifiable computation Fully Homomorphic Encryption homomorphic message authentication codes
2016/1/25
We study the task of verifiable delegation of computation on encrypted data. We improve
previous definitions in order to tolerate adversaries that learn whether or not clients accept the result
of a...
Verified Implementations for Secure and Verifiable Computation
Garbled Circuits Secure Function Evaluation Verifiable Computation
2016/1/9
Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend...
Verifiable computation using multiple provers
interactive proofs verifiable computation circuit evaluation
2016/1/6
The increasing ubiquity of the cloud computing paradigm has renewed focus on the classical problem of allowing weak clients to check the results of computation delegated to powerful servers. Recent ad...
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent work has dramatically reduced the client’s ...
Multi-Client Verifiable Computation with Stronger Security Guarantees
Verifiable Computation Attribute-based Encrpytion Functional Encryption
2016/1/4
Choi et al. (TCC 2013) introduced the notion of multi-client verifiable computation (MVC)
in which a set of clients outsource to an untrusted server the computation of a function f over
their collec...
Gennaro et al.\ (Crypto 2010) introduced the notion of \emph{non-interactive verifiable computation}, which allows a computationally weak client to outsource the computation of a function f on a serie...
Hybrid Publicly Verifiable Computation
Publicly Verifiable Computation Outsourced Computation Dual-Policy Attribute-based Encryption
2015/12/31
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations
to more powerful servers, and to verify the correctness of results. Delegation and
verification rely onl...
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
multiparty computation certificate validation
2015/12/30
Verifiable computation allows a client to outsource computations
to a worker with a cryptographic proof of correctness of the result
that can be verified faster than performing the computation. Rece...
To instill greater confidence in computations outsourced to the cloud, clients should be able to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built system for...
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
cryptographic protocols / Verifiable Computation Delegation
2012/6/14
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes the delegation of computation to large data centers a desirable solution. Howev...
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
cryptographic protocols / Verifiable Computation Delegation Public-Key Cryptography Attribute-Based Encryption
2012/3/22
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes the delegation of computation to large data centers a desirable solution. Howev...
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
cryptographic protocols / Verifiable Computation, Delegation Public-Key Cryptography Attribute-Based Encryption
2012/3/21
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes the delegation of computation to large data centers a desirable solution. Howev...