Multi-client verifiable computation with stronger security guarantees
DOI10.1007/978-3-662-46497-7_6zbMATH Open1379.94039OpenAlexW37483258MaRDI QIDQ5261673FDOQ5261673
Authors: S. Dov Gordon, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou, Jonathan Katz
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_6
Recommendations
- Multi-client non-interactive verifiable computation
- Multi-client outsourced computation
- Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
- Non-interactive verifiable computing: outsourcing computation to untrusted workers
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10)
Cited In (17)
- Specifying and verifying secrecy in workflows with arbitrarily many agents
- Multi-clients verifiable computation via conditional disclosure of secrets
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
- Multi-client non-interactive verifiable computation
- Verifiable multi-party computation with perfectly private audit trail
- Private polynomial commitments and applications to MPC
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
- Multi-key Homomorphic Authenticators
- Verifiable computation for randomized algorithm
- Efficient and secure outsourced approximate pattern matching protocol
- Server-aided private set intersection based on reputation
- Function-Dependent Commitments for Verifiable Multi-party Computation
- Lighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryption
- Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation
- Multi-client outsourced computation
- Verification protocol for stable matching from conditional disclosure of secrets
This page was built for publication: Multi-client verifiable computation with stronger security guarantees
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261673)