Improved Delegation of Computation Using Fully Homomorphic Encryption

From MaRDI portal
Publication:3582772

DOI10.1007/978-3-642-14623-7_26zbMath1284.68063OpenAlexW2116653107MaRDI QIDQ3582772

Kai-Min Chung, Yael Kalai, Salil P. Vadhan

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_26




Related Items (42)

Identity-based re-encryption scheme with lightweight re-encryption key generationDelegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationSuccinct non-interactive arguments via linear interactive proofsFine-grained secure computationIncompressible functions, relative-error extractors, and the power of nondeterministic reductionsVerifiable Computation for Randomized AlgorithmArguments of ProximityAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseSecure outsourcing of modular exponentiations under single untrusted programme modelSecure and efficient outsourcing computation on large-scale linear regressionsPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesRefereed delegation of computationBatch verifiable computation of outsourced functionsNon-interactive publicly-verifiable delegation of committed programsRinocchio: SNARKs for ring arithmeticMulti-key Homomorphic AuthenticatorsEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing schemeNon-interactive universal argumentsMultikey Fully Homomorphic Encryption and ApplicationsGroup homomorphic encryption: characterizations, impossibility results, and applicationsThe hunting of the SNARKConfidentiality-Preserving Publicly Verifiable ComputationEfficient and secure delegation of exponentiation in general groups to a single malicious serverPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudOn Privacy-Preserving Biometric AuthenticationFoundations of Homomorphic Secret SharingSecure and efficient delegation of elliptic-curve pairingAlgebraic (trapdoor) one-way functions: constructions and applicationsEfficient computation outsourcing for inverting a class of homomorphic functionsPractical homomorphic message authenticators for arithmetic circuitsPrivacy-preserving verifiable delegation of polynomial and matrix functionsNo-signaling linear PCPsDelegating a product of group exponentiations with application to signature schemesIndistinguishability Obfuscation: From Approximate to ExactNo-signaling linear PCPsEfficient and secure outsourced approximate pattern matching protocolMulti-server verifiable delegation of computations: unconditional security and practical efficiencyBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsVerifiable single-server private information retrieval from LWE with binary errorsProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsConstant-Round Interactive Proofs for Delegating Computation




This page was built for publication: Improved Delegation of Computation Using Fully Homomorphic Encryption