Verifiable multi-party computation with perfectly private audit trail
From MaRDI portal
Publication:2822682
DOI10.1007/978-3-319-39555-5_20zbMATH Open1346.68035OpenAlexW2479190638MaRDI QIDQ2822682FDOQ2822682
Authors: Édouard Cuvelier, Olivier Pereira
Publication date: 4 October 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-39555-5_20
Recommendations
- Publicly auditable secure multi-party computation
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
Cites Work
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Secure multiparty computation goes live
- Multi-input functional encryption
- Proofs of Restricted Shuffles
- Practical covertly secure MPC for dishonest majority -- or: breaking the SPDZ limits
- How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
- Multi-client verifiable computation with stronger security guarantees
- Multi-client non-interactive verifiable computation
- Publicly auditable secure multi-party computation
Cited In (6)
- Cryptanalysis of a privacy preserving auditing for data integrity protocol from TrustCom 2013
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Title not available (Why is that?)
- Certificate validation in secure computation and its use in verifiable linear programming
- Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
- Publicly auditable secure multi-party computation
Uses Software
This page was built for publication: Verifiable multi-party computation with perfectly private audit trail
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2822682)