Verifiable Computation of Large Polynomials
暂无分享,去创建一个
Haixia Xu | Peili Li | Jiaqi Hong | Haixia Xu | Peili Li | Jia-ming Hong
[1] Manuel Barbosa,et al. Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation , 2012, CT-RSA.
[2] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[3] Jonathan Katz,et al. Multi-Client Non-interactive Verifiable Computation , 2013, TCC.
[4] Graham Cormode,et al. Practical verified computation with streaming interactive proofs , 2011, ITCS '12.
[5] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[6] Payman Mohassel,et al. Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..
[7] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[8] Jean-Sébastien Coron,et al. Practical Multilinear Maps over the Integers , 2013, CRYPTO.
[9] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[10] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[11] Reihaneh Safavi-Naini,et al. Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps , 2013, CANS.
[12] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[13] Allison Bishop,et al. Efficient pseudorandom functions from the decisional linear assumption and weaker variants , 2009, CCS.
[14] D. Boneh,et al. Interactive proofs of proximity: delegating computation in sublinear time , 2013, STOC '13.
[15] Brent Waters,et al. Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures , 2013, CRYPTO.
[16] Shafi Goldwasser,et al. Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs , 2011, IACR Cryptol. ePrint Arch..
[17] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[18] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[19] Graham Cormode,et al. Verifying Computations with Streaming Interactive Proofs , 2011, Proc. VLDB Endow..
[20] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[21] Rosario Gennaro,et al. Generalizing Homomorphic MACs for Arithmetic Circuits , 2014, IACR Cryptol. ePrint Arch..
[22] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[23] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[24] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[25] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[26] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.