Multi-client verifiable computation with stronger security guarantees
DOI10.1007/978-3-662-46497-7_6zbMATH Open1379.94039OpenAlexW37483258MaRDI QIDQ5261673FDOQ5261673
Hong-Sheng Zhou, Feng-Hao Liu, Jonathan Katz, S. Dov Gordon, Elaine Shi
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_6
Recommendations
- Multi-client non-interactive verifiable computation
- Multi-client outsourced computation
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10)
Cited In (15)
- Specifying and verifying secrecy in workflows with arbitrarily many agents
- Multi-clients verifiable computation via conditional disclosure of secrets
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- Private polynomial commitments and applications to MPC
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Multi-key Homomorphic Authenticators
- Verifiable Multi-party Computation with Perfectly Private Audit Trail
- Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
- Efficient and secure outsourced approximate pattern matching protocol
- Server-aided private set intersection based on reputation
- Verifiable Computation for Randomized Algorithm
- Function-Dependent Commitments for Verifiable Multi-party Computation
- Lighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryption
- Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
- Verification protocol for stable matching from conditional disclosure of secrets
This page was built for publication: Multi-client verifiable computation with stronger security guarantees
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261673)