C Xiang, C Tang - International Journal of Grid and Utility …, 2016 - inderscienceonline.com
We study the construction of efficient verifiable outsourced computation for arbitrary functions. We improve previous verifiable outsourced computation schemes for arbitrary …
We introduce and formalize the notion of Verifiable Computation, which enables a computationally weak client to “outsource” the computation of a function F on various …
Abstract Gennaro et al.(Crypto 2010) introduced the notion of non-interactive verifiable computation, which allows a computationally weak client to outsource the computation of a …
P Lafourcade, G Marcadet, L Robert - Cryptology ePrint Archive, 2022 - scholar.archive.org
In 1986, A. Yao introduced the notion of garbled circuits, designed to verify the correctness of computations performed on an untrusted server. However, correctness is guaranteed for …
LF Zhang, R Safavi-Naini - … Symposium on Research in Computer Security, 2015 - Springer
Secure outsourcing of computation to cloud servers has attracted much attention in recent years. In a typical outsourcing scenario, the client stores its data on a cloud server and later …
X Yu, Z Yan, R Zhang - Information Sciences, 2019 - Elsevier
In recent years, cloud computing has become the most popular and promising service platform. A cloud user can outsource its heavy computation overhead to a cloud service …
J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of theoretical cryptography. Since that time a number of papers have been published which …
J Zhou, Z Cao, X Dong, X Lin - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Verifiable outsourced computation enables a computational resource-constrained mobile device to outsource the computation of a function F on multiple inputs x 1,…, xn to the cloud …
LF Zhang, R Safavi-Naini - Designs, Codes and Cryptography, 2020 - Springer
Outsourcing computation has gained significant attention in recent years in particular due to the prevalence of cloud computing. There are two main security concerns in outsourcing …