Flexible and efficient verifiable computation on encrypted data
From MaRDI portal
Publication:2061972
Recommendations
- Boosting verifiable computation on encrypted data
- Verifiable computation on outsourced encrypted data
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
Cites work
- scientific article; zbMATH DE number 5485522 (Why is no real title available?)
- scientific article; zbMATH DE number 2002850 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- Aurora: transparent succinct arguments for R1CS
- Boosting verifiable computation on encrypted data
- FHEW: bootstrapping homomorphic encryption in less than a second
- Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds
- Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE
- Fiat-Shamir: from practice to theory
- Fully homomorphic SIMD operations
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption for arithmetic of approximate numbers
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Homomorphic lower digits removal and improved FHE bootstrapping
- How to delegate and verify in public: verifiable computation from attribute-based encryption
- How to run Turing machines on encrypted data
- Interactive oracle proofs
- Libra: succinct zero-knowledge proofs with optimal prover computation
- Marlin: preprocessing zkSNARKs with universal and updatable SRS
- Modern computer algebra
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Practical verified computation with streaming interactive proofs
- Quadratic span programs and succinct NIZKs without PCPs
- Time-optimal interactive proofs for circuit evaluation
Cited in
(14)- Private polynomial commitments and applications to MPC
- Vector commitments over rings and compressed \(\varSigma \)-protocols
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Fine-grained secure computation
- A domain-specific language for computing on encrypted data. (Invited talk)
- Boosting verifiable computation on encrypted data
- Verifiable computation on outsourced encrypted data
- Lighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryption
- Information Security and Cryptology - ICISC 2005
- Batch Computations Revisited: Combining Key Computations and Batch Verifications
- MyOPE: malicious security for oblivious polynomial evaluation
- Rinocchio: SNARKs for ring arithmetic
- Doubly efficient interactive proofs over infinite and non-commutative rings
- How to prove statements obliviously?
This page was built for publication: Flexible and efficient verifiable computation on encrypted data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2061972)