Revocation in publicly verifiable outsourced computation
From MaRDI portal
Publication:3454572
DOI10.1007/978-3-319-16745-9_4zbMATH Open1400.94110OpenAlexW231770548MaRDI QIDQ3454572FDOQ3454572
Authors: James Alderman, Christian Janson, Carlos Cid, J. Crampton
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_4
Recommendations
- Hybrid publicly verifiable computation
- Confidentiality-preserving publicly verifiable computation
- Multi-client outsourced computation
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
revocationkey-policy attribute-based encryptionkey distribution centerpublicly verifiable outsourced computation
Cites Work
- Fully homomorphic encryption using ideal lattices
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
- Attribute-based encryption supporting direct/indirect revocation modes
- How to delegate and verify in public: verifiable computation from attribute-based encryption
- Multi-input functional encryption
- Revocation in publicly verifiable outsourced computation
- Multi-client non-interactive verifiable computation
Cited In (6)
- Multi-party revocation in sovrin: performance through distributed trust
- Hybrid publicly verifiable computation
- Revocation in publicly verifiable outsourced computation
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Universally composable cryptographic role-based access control
- Confidentiality-preserving publicly verifiable computation
This page was built for publication: Revocation in publicly verifiable outsourced computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454572)