• No results found

verifiable computation

Multi-Client  Verifiable  Computation  with  Stronger  Security  Guarantees

Multi-Client Verifiable Computation with Stronger Security Guarantees

... We then present a generic compiler that upgrades our intermediate solution (as well as the one by Choi et al. [15]) to handle an arbitrary subset of malicious clients. While we could rely on standard techniques here ...

34

Verified  Implementations  for  Secure   and  Verifiable  Computation

Verified Implementations for Secure and Verifiable Computation

... We consider circuit-based cloud-oriented cryptographic proto- cols for secure and verifiable computation over encrypted data. Our examples share as central component Yao’s celebrated transforma- tion of a ...

13

Incrementally  Verifiable  Computation  via  Incremental  PCPs

Incrementally Verifiable Computation via Incremental PCPs

... the PCP. In particular, an adversarially generated proof may consist of a good “core PCP” that verifies correctly, together with corrupted supplemental values that would prevent this PCP from updating. Related work. In a ...

40

Multi-Client  Non-Interactive  Verifiable  Computation

Multi-Client Non-Interactive Verifiable Computation

... interactive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of in- puts x (1) , ...

20

Verifiable  computation  using  multiple  provers

Verifiable computation using multiple provers

... It has long been known that there are theoretical solutions to this problem that make no such assumptions other than perhaps standard cryptographic ones [8, 9, 40, 40, 42, 46, 51, 54, 72]. Roughly speaking, the client, ...

37

Trinocchio:  Privacy-Friendly  Outsourcing  by  Distributed  Verifiable  Computation

Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation

... Abstract. Verifiable computation allows a client to outsource computa- tions to a worker with a cryptographic proof of correctness of the result that can be verified faster than performing the ...than ...

33

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

... with verifiable delegation scheme is presented to express the strongest form of access control ...with verifiable computation and encrypt-then- mac mechanism to delegate the verifiable partial ...

5

Hybrid  Publicly  Verifiable  Computation

Hybrid Publicly Verifiable Computation

... Verifiable computation [17, 13, 27, 16, 12, 10, 23] may be seen as a protocol between a (weak) client C and a server S, resulting in the provably correct computation of F (x) by the server for the ...

41

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

A Novel Key-Policy Attribute-Based Encryption Schema with Verifiable Computation in Cloud

... with verifiable delegation ...Combined verifiable computation and encrypt-then-mac mechanism with our ciphertext-policy attribute-based hybrid encryption, we could delegate the verifiable ...

5

Scaling  Verifiable  Computation  Using  Efficient  Set  Accumulators

Scaling Verifiable Computation Using Efficient Set Accumulators

... general-purpose verifiable state update applications, in this work we show that a Merkle tree is not the best choice for large batches of state updates when S is moderately to very large, say |S| ≥ 2 10 ...

18

Verified and Verifiable Computation with STV Algorithms

Verified and Verifiable Computation with STV Algorithms

... In general, one can advance this component of the framework from three dimensions. • Extensibility. This framework component accommodates formalisation and verification of a large class of STV schemes. However, it does ...

201

Proof of All : Verifiable Computation in a Nutshell

Proof of All : Verifiable Computation in a Nutshell

... • slow-timed hash functions: delay functions are interesting alternatives to classic iterated hashing techniques and Key Derivation Functions, with the advantage of being scalable and sequential. They can be used for ...

79

Geppetto:  Versatile  Verifiable  Computation

Geppetto: Versatile Verifiable Computation

... of verifiable computations, with the outer top-level calling ‘level 2’ outsourced functions, which in turn call inner ‘level 1’ outsourced functions according to their own ...

22

Function-Dependent  Commitments  for  Verifiable  Multi-Party  Computation

Function-Dependent Commitments for Verifiable Multi-Party Computation

... Verifiable computation: There are many more verifiable computing schemes using proof- and argument-based systems, or based on fully homomorphic ...argument-based verifiable computing schemes ...

25

Verifiable Delegation of Computation through Fully Homomorphic Encryption

Verifiable Delegation of Computation through Fully Homomorphic Encryption

... Table 1 shows the run-time for different parameters (depth and complexity) of the circuits which consist only of XOR gates and Table 2 shows the same for circuits with only AND gates. Fig 5 and Fig 6 show the graph ...

6

On  Publicly  Verifiable  Delegation  From  Standard  Assumptions

On Publicly Verifiable Delegation From Standard Assumptions

... In this work we focus on the following setting: given a program M and an input x, the prover would like to convince the verifier that M (x) = y. The verifier is given x, and a representation of M (for example, as a ...

33

Outlook Database under Keyword Common Reliable Internal Rating

Outlook Database under Keyword Common Reliable Internal Rating

... product computation over any two outsourced stock data streams from different sources for correlation analysis, a stock market trader is able to spot the arbitrage ...the computation result provided by the ...

5

Efficient  RAM   and  control  flow  in  verifiable  outsourced  computation

Efficient RAM and control flow in verifiable outsourced computation

... For our purposes, GGPR is a zero-knowledge SNARK (Succinct Non-interactive Argument of Knowl- edge) with preprocessing [22, 41], which is to say that it is a protocol with the following structure and properties. There ...

25

Verifiable ASICs

Verifiable ASICs

... for verifiable computation, except CMT applied to highly reg- ular ACs, presume offline precomputation on behalf of the verifier that exceeds the work of simply executing the compu- tation [24, 25, 29, ...

20

Revocation  in  Publicly  Verifiable  Outsourced  Computation

Revocation in Publicly Verifiable Outsourced Computation

... non-interactive verifiable computation in which there is only one round of interaction between the client and the server each time a computation is performed and introduced a construction based on ...

43

Show all 2994 documents...

Related subjects