Verifiable multi-party computation with perfectly private audit trail
From MaRDI portal
Publication:2822682
Recommendations
- Publicly auditable secure multi-party computation
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
Cites work
- scientific article; zbMATH DE number 1406779 (Why is no real title available?)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
- Multi-client non-interactive verifiable computation
- Multi-client verifiable computation with stronger security guarantees
- Multi-input functional encryption
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Practical covertly secure MPC for dishonest majority -- or: breaking the SPDZ limits
- Proofs of Restricted Shuffles
- Publicly auditable secure multi-party computation
- Secure multiparty computation goes live
Cited in
(7)- Absentia: secure multiparty computation on ethereum
- scientific article; zbMATH DE number 6829278 (Why is no real title available?)
- Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
- Cryptanalysis of a privacy preserving auditing for data integrity protocol from TrustCom 2013
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Certificate validation in secure computation and its use in verifiable linear programming
- Publicly auditable secure multi-party computation
This page was built for publication: Verifiable multi-party computation with perfectly private audit trail
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2822682)