Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

From MaRDI portal
Publication:3582771

DOI10.1007/978-3-642-14623-7_25zbMath1284.68065OpenAlexW1557386445MaRDI QIDQ3582771

Bryan Parno, Rosario Gennaro, Craig Gentry

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_25




Related Items (92)

Identity-based re-encryption scheme with lightweight re-encryption key generationDelegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationSuccinct non-interactive arguments via linear interactive proofsFine-grained secure computationSuccinct garbling schemes from functional encryption through a local simulation paradigmIncompressible functions, relative-error extractors, and the power of nondeterministic reductionsRevocation in Publicly Verifiable Outsourced ComputationCRT-Based Outsourcing Algorithms for Modular ExponentiationsVerifiable Computation for Randomized AlgorithmArguments of ProximityLOVE a pairingAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseAdaptive security of practical garbling schemesSecure outsourcing of modular exponentiations under single untrusted programme modelIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsSecure and efficient outsourcing computation on large-scale linear regressionsPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesVerifiable inner product computation on outsourced database for authenticated multi-user data sharingRefereed delegation of computationCloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemLinearly homomorphic structure-preserving signatures and their applicationsBatch verifiable computation of outsourced functionsSecure Two-Party Computation: A Visual WayPrivate polynomial commitments and applications to MPCNon-interactive publicly-verifiable delegation of committed programsRinocchio: SNARKs for ring arithmeticMulti-key Homomorphic AuthenticatorsReactive Garbling: Foundation, Instantiation, ApplicationEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing schemeRigidity of quantum steering and one-sided device-independent verifiable quantum computationFunction-Dependent Commitments for Verifiable Multi-party ComputationLighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryptionMyOPE: malicious security for oblivious polynomial evaluationMultikey Fully Homomorphic Encryption and Applications$$\mathsf {HIKE}$$ : Walking the Privacy TrailAn Efficient and Provably Secure Private Polynomial Evaluation SchemeGame-Theoretic Analysis of an Incentivized Verifiable Computation SystemZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsVector commitments over rings and compressed \(\varSigma \)-protocolsGroup homomorphic encryption: characterizations, impossibility results, and applicationsThe hunting of the SNARKPublicly verifiable database scheme with efficient keyword searchConfidentiality-Preserving Publicly Verifiable ComputationEfficient and secure delegation of exponentiation in general groups to a single malicious serverUnnamed ItemPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudOn Privacy-Preserving Biometric AuthenticationThrackles: An Improved Upper BoundEfficient algorithms for secure outsourcing of bilinear pairingsSecure and efficient delegation of elliptic-curve pairingPerennial secure multi-party computation of universal Turing machineAlgebraic (trapdoor) one-way functions: constructions and applicationsTrusted computing with addition machines. IISecure Outsourced ComputationEfficient computation outsourcing for inverting a class of homomorphic functionsPractical homomorphic message authenticators for arithmetic circuitsSecure computation without computersHow to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fieldsVerifiable pattern matching on outsourced textsNew publicly verifiable computation for batch matrix multiplicationPrivacy-preserving verifiable delegation of polynomial and matrix functionsNo-signaling linear PCPsDelegating a product of group exponentiations with application to signature schemesNo-signaling linear PCPsMulti-input Functional Encryption and Its Application in Outsourcing ComputationOn subversion-resistant SNARKsEfficient and secure outsourced approximate pattern matching protocolLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresMulti-server verifiable delegation of computations: unconditional security and practical efficiencyOn the power of secure two-party computationBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsSecure and Traceable Framework for Data CirculationBoosting verifiable computation on encrypted dataProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsTrinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable ComputationVerifiable Multi-party Computation with Perfectly Private Audit TrailFlexible and efficient verifiable computation on encrypted dataThe Feasibility of Outsourced Database Search in the Plain ModelVerifiable Pattern Matching on Outsourced TextsOn Garbling Schemes with and Without PrivacyOn the Power of Secure Two-Party ComputationSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsAdaptively Secure Garbled Circuits from One-Way FunctionsOutsourcing computation: the minimal refereed mechanismConstant-Round Interactive Proofs for Delegating ComputationVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsRound-optimal black-box commit-and-prove with succinct communicationProgressive and efficient verification for digital signaturesEfficient oblivious evaluation protocol and conditional disclosure of secrets for DFAGarbled Circuits as Randomized Encodings of Functions: a PrimerComputational Integrity with a Public Random String from Quasi-Linear PCPs




This page was built for publication: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers