Verifiable Delegation of Computation over Large Datasets

From MaRDI portal
Publication:5199187

DOI10.1007/978-3-642-22792-9_7zbMath1288.68159OpenAlexW2136936712MaRDI QIDQ5199187

Siavosh Benabbas, Yevgeniy Vahlis, Rosario Gennaro

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_7




Related Items (41)

Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationMultilinear Pseudorandom FunctionsSuccinct non-interactive arguments via linear interactive proofsVerifiable Computation for Randomized AlgorithmEfficient Pseudorandom Functions via On-the-Fly AdaptationPublicly verifiable databases with efficient insertion/deletion operationsOn succinct non-interactive arguments in relativized worldsVerifiable inner product computation on outsourced database for authenticated multi-user data sharingRefereed delegation of computationBatch verifiable computation of outsourced functionsProof-carrying data from arithmetized random oraclesFunctional commitments for all functions, with transparent setup and from SISSuccinct vector, polynomial, and functional commitments from latticesPrivate polynomial commitments and applications to MPCMulti-key Homomorphic AuthenticatorsOn the impossibility of algebraic vector commitments in pairing-free groupsThe hunting of the SNARKPublicly verifiable database scheme with efficient keyword searchConfidentiality-Preserving Publicly Verifiable ComputationNon-malleable vector commitments via local equivocabilityVector and functional commitments from latticesPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudOn Privacy-Preserving Biometric AuthenticationEfficient algorithms for secure outsourcing of bilinear pairingsVerifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage EfficiencyFine-grained searchable encryption in multi-user settingAlgebraic (trapdoor) one-way functions: constructions and applicationsTrusted computing with addition machines. IIEfficient computation outsourcing for inverting a class of homomorphic functionsPractical homomorphic message authenticators for arithmetic circuitsOblivious polynomial evaluation and secure set-intersection from algebraic PRFsVector Commitments and Their ApplicationsNew publicly verifiable computation for batch matrix multiplicationPrivacy-preserving verifiable delegation of polynomial and matrix functionsNon-malleable vector commitments via local equivocabilityMulti-server verifiable delegation of computations: unconditional security and practical efficiencyBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsSecure and Traceable Framework for Data CirculationProxy Re-encryption with Delegatable VerifiabilityVerifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing StorageProtecting data privacy in publicly verifiable delegation of matrix and polynomial functions




This page was built for publication: Verifiable Delegation of Computation over Large Datasets