搜索结果: 1-14 共查到“军事学 verifiable computation”相关记录14条 . 查询时间(0.063 秒)
Stateful Multi-Client Verifiable Computation
Byzantine emulation verifiable computation authenticated data types
font style='font-size:12px;'>
2017/9/25
This paper develops a cryptographic protocol for outsourcing arbitrary stateful computation among multiple clients to an untrusted server, while guaranteeing integrity of the data. The clients communi...
Verifiable Computation in Multiparty Protocols with Honest Majority
Secure multiparty computation verifiable computation linear PCP
font style='font-size:12px;'>
2016/1/26
We present a generic method for turning passively secure
protocols into protocols secure against covert attacks. The method adds
a post-execution verification phase to the protocol that allows a mis...
Efficiently Verifiable Computation on Encrypted Data
verifiable computation Fully Homomorphic Encryption homomorphic message authentication codes
font style='font-size:12px;'>
2016/1/25
We study the task of verifiable delegation of computation on encrypted data. We improve
previous definitions in order to tolerate adversaries that learn whether or not clients accept the result
of a...
Verified Implementations for Secure and Verifiable Computation
Garbled Circuits Secure Function Evaluation Verifiable Computation
font style='font-size:12px;'>
2016/1/9
Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend...
Verifiable computation using multiple provers
interactive proofs verifiable computation circuit evaluation
font style='font-size:12px;'>
2016/1/6
The increasing ubiquity of the cloud computing paradigm has renewed focus on the classical problem of allowing weak clients to check the results of computation delegated to powerful servers. Recent ad...
Geppetto: Versatile Verifiable Computation
Verifiable computation SNARKs
font style='font-size:12px;'>
2016/1/5
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent work has dramatically reduced the client’s ...
Multi-Client Verifiable Computation with Stronger Security Guarantees
Verifiable Computation Attribute-based Encrpytion Functional Encryption
font style='font-size:12px;'>
2016/1/4
Choi et al. (TCC 2013) introduced the notion of multi-client verifiable computation (MVC)
in which a set of clients outsource to an untrusted server the computation of a function f over
their collec...
Multi-Client Non-Interactive Verifiable Computation
foundations verifiable computation
font style='font-size:12px;'>
2016/1/3
Gennaro et al.\ (Crypto 2010) introduced the notion of \emph{non-interactive verifiable computation}, which allows a computationally weak client to outsource the computation of a function f on a serie...
Hybrid Publicly Verifiable Computation
Publicly Verifiable Computation Outsourced Computation Dual-Policy Attribute-based Encryption
font style='font-size:12px;'>
2015/12/31
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations
to more powerful servers, and to verify the correctness of results. Delegation and
verification rely onl...
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
multiparty computation certificate validation
font style='font-size:12px;'>
2015/12/30
Verifiable computation allows a client to outsource computations
to a worker with a cryptographic proof of correctness of the result
that can be verified faster than performing the computation. Rece...
Pinocchio: Nearly Practical Verifiable Computation
verifiable computation NIZKs
font style='font-size:12px;'>
2014/3/13
To instill greater confidence in computations outsourced to the cloud, clients should be able to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built system for...
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
cryptographic protocols / Verifiable Computation Delegation
font style='font-size:12px;'>
2012/6/14
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes the delegation of computation to large data centers a desirable solution. Howev...
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
cryptographic protocols / Verifiable Computation Delegation Public-Key Cryptography Attribute-Based Encryption
font style='font-size:12px;'>
2012/3/22
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes the delegation of computation to large data centers a desirable solution. Howev...
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
cryptographic protocols / Verifiable Computation, Delegation Public-Key Cryptography Attribute-Based Encryption
font style='font-size:12px;'>
2012/3/21
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes the delegation of computation to large data centers a desirable solution. Howev...