From secrecy to soundness: efficient verification via secure computation (extended abstract)
From MaRDI portal
Publication:3587376
Recommendations
Cited in
(43)- Practical homomorphic message authenticators for arithmetic circuits
- On black-box verifiable outsourcing
- Fine-grained secure computation
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
- Two protocols for delegation of computation
- Succinct non-interactive arguments via linear interactive proofs
- Privacy-preserving verifiable delegation of polynomial and matrix functions
- Efficient proof composition for verifiable computation
- Verifiable pattern matching on outsourced texts
- scientific article; zbMATH DE number 7746256 (Why is no real title available?)
- Incompressible functions, relative-error extractors, and the power of nondeterministic reductions
- Garbled circuits as randomized encodings of functions: a primer
- Arguments of proximity (extended abstract)
- Statistical randomized encodings: a complexity theoretic view
- Verifiable computation for randomized algorithm
- An algebraic framework for silent preprocessing with trustless setup and active security
- Doubly efficient interactive proofs over infinite and non-commutative rings
- Batch verifiable computation of outsourced functions
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- On the Power of Secure Two-Party Computation
- Boosting verifiable computation on encrypted data
- The feasibility of outsourced database search in the plain model
- Efficient and generic methods to achieve active security in private information retrieval and more advanced database search
- On garbling schemes with and without privacy
- Constant-round interactive proofs for delegating computation
- On the computational soundness of cryptographically masked flows
- How to simulate it in Isabelle: towards formal proof for secure multi-party computation
- Multikey fully homomorphic encryption and applications
- Algebraic (trapdoor) one-way functions: constructions and applications
- Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
- On the power of secure two-party computation
- Attacks on the basic cMix design: on the necessity of commitments and randomized partial checking
- The hunting of the SNARK
- Verifiable Computation and Succinct Arguments for NP
- How to prove statements obliviously?
- Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
- Efficient computation outsourcing for inverting a class of homomorphic functions
- Encoding functions with constant online rate, or how to compress garbled circuit keys
- Adaptively secure garbled circuits from one-way functions
- Refereed delegation of computation
- scientific article; zbMATH DE number 7378548 (Why is no real title available?)
- Publicly verifiable database scheme with efficient keyword search
This page was built for publication: From secrecy to soundness: efficient verification via secure computation (extended abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3587376)