Verifiable Computing for Specific Applications
暂无分享,去创建一个
[1] Jianfeng Ma,et al. Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..
[2] Craig Gentry,et al. Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..
[3] David Naccache,et al. Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..
[4] Craig Gentry,et al. Fully Homomorphic Encryption without Bootstrapping , 2011, IACR Cryptol. ePrint Arch..
[5] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[6] Ran Canetti,et al. Two Protocols for Delegation of Computation , 2012, ICITS.
[7] Refik Molva,et al. Efficient Techniques for Publicly Verifiable Delegation of Computation , 2016, AsiaCCS.
[8] Elaine Shi,et al. TRUESET: Faster Verifiable Set Computations , 2014, USENIX Security Symposium.
[9] Rosario Gennaro,et al. Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.
[10] Elaine Shi,et al. Signatures of Correct Computation , 2013, TCC.
[11] Fangguo Zhang,et al. Efficient computation outsourcing for inverting a class of homomorphic functions , 2014, Inf. Sci..
[12] Benny Applebaum. Randomly Encoding Functions: A New Cryptographic Paradigm - (Invited Talk) , 2011, ICITS.
[13] Anna Gál,et al. On Arithmetic Branching Programs , 1999, J. Comput. Syst. Sci..
[14] Yuan Zhou,et al. Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations , 2016, ACISP.
[15] Reihaneh Safavi-Naini,et al. Verifiable local computation on distributed data , 2014, SCC '14.