Non-interactive verifiable computing: outsourcing computation to untrusted workers
From MaRDI portal
Publication:3582771
DOI10.1007/978-3-642-14623-7_25zbMATH Open1284.68065OpenAlexW1557386445MaRDI QIDQ3582771FDOQ3582771
Authors: Rosario Gennaro, Craig Gentry, Bryan Parno
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_25
Recommendations
- Multi-client non-interactive verifiable computation
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Multi-client outsourced computation
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
Cited In (only showing first 100 items - show all)
- Group homomorphic encryption: characterizations, impossibility results, and applications
- Multi-clients verifiable computation via conditional disclosure of secrets
- How to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fields
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Perennial secure multi-party computation of universal Turing machine
- New publicly verifiable computation for batch matrix multiplication
- Optimal contracts for outsourced computation
- Trusted computing with addition machines. II
- Practical homomorphic message authenticators for arithmetic circuits
- Revocation in publicly verifiable outsourced computation
- Secure outsourcing of modular exponentiations under single untrusted programme model
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
- Fine-grained secure computation
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
- Multi-client non-interactive verifiable computation
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Integrity and consistency for untrusted services (extended abstract)
- Multi-input functional encryption and its application in outsourcing computation
- Verifiable multi-party computation with perfectly private audit trail
- Adaptive succinct garbled RAM or: how to delegate your database
- Private polynomial commitments and applications to MPC
- Privacy-preserving verifiable delegation of polynomial and matrix functions
- Delegating a product of group exponentiations with application to signature schemes
- Verifiable pattern matching on outsourced texts
- Verifiable pattern matching on outsourced texts
- Garbled circuits as randomized encodings of functions: a primer
- Efficient proof composition for verifiable computation
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Flexible and efficient verifiable computation on encrypted data
- Incompressible functions, relative-error extractors, and the power of nondeterministic reductions
- Round-optimal black-box commit-and-prove with succinct communication
- Efficient and secure delegation of exponentiation in general groups to a single malicious server
- Arguments of proximity (extended abstract)
- Multi-key Homomorphic Authenticators
- On subversion-resistant SNARKs
- CRT-based outsourcing algorithms for modular exponentiations
- Batch verifiable computation of outsourced functions
- Linearly homomorphic structure-preserving signatures and their applications
- LOVE a pairing
- Non-interactive and verifiable outsourcing computation scheme for modular exponentiation
- An Efficient and Provably Secure Private Polynomial Evaluation Scheme
- Practical verified computation with streaming interactive proofs
- Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
- On the Power of Secure Two-Party Computation
- Computational integrity with a public random string from quasi-linear PCPs
- Zero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomials
- Efficient algorithms for secure outsourcing of bilinear pairings
- Boosting verifiable computation on encrypted data
- Game-Theoretic Analysis of an Incentivized Verifiable Computation System
- The feasibility of outsourced database search in the plain model
- Efficient and secure outsourced approximate pattern matching protocol
- Proof-of-work certificates that can be efficiently computed in the cloud (invited talk)
- Multi-client verifiable computation with stronger security guarantees
- On garbling schemes with and without privacy
- Outsourcing computation: the minimal refereed mechanism
- From secrecy to soundness: efficient verification via secure computation (extended abstract)
- Progressive and efficient verification for digital signatures
- Rigidity of quantum steering and one-sided device-independent verifiable quantum computation
- On the power of secure two-party computation
- Algebraic (trapdoor) one-way functions: constructions and applications
- The hunting of the SNARK
- Efficient computation outsourcing for inverting a class of homomorphic functions
- Encoding functions with constant online rate, or how to compress garbled circuit keys
- Adaptively secure garbled circuits from one-way functions
- Secure computation without computers
- Refereed delegation of computation
- Adaptive security of practical garbling schemes
- Polynomial IOPs for memory consistency checks in zero-knowledge virtual machines
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- Secure two-party computation: a visual way
- No-signaling linear PCPs
- On black-box verifiable outsourcing
- Reactive garbling: foundation, instantiation, application
- $$\mathsf {HIKE}$$ : Walking the Privacy Trail
- zk-SNARKs from codes with rank metrics
- Secure and traceable framework for data circulation
- Title not available (Why is that?)
- Succinct non-interactive arguments via linear interactive proofs
- On privacy-preserving biometric authentication
- Rinocchio: SNARKs for ring arithmetic
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Secure outsourced computation
- Cloud-assisted LLL: a secure and efficient outsourcing algorithm for approximate shortest vector problem
- Verifiable computation for randomized algorithm
- Non-interactive publicly-verifiable delegation of committed programs
- MyOPE: malicious security for oblivious polynomial evaluation
- Verifiable computation with reduced informational costs and computational costs
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Spooky interaction and its discontents: compilers for succinct two-message argument systems
- Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives
- Secure and efficient outsourcing computation on large-scale linear regressions
- Secure and efficient delegation of elliptic-curve pairing
- Identity-based re-encryption scheme with lightweight re-encryption key generation
- No-signaling linear PCPs
- Confidentiality-preserving publicly verifiable computation
- Verifiable inner product computation on outsourced database for authenticated multi-user data sharing
- Thrackles: an improved upper bound
- Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme
- Efficient and generic methods to achieve active security in private information retrieval and more advanced database search
This page was built for publication: Non-interactive verifiable computing: outsourcing computation to untrusted workers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3582771)