Efficient non-interactive verifiable outsourced computation for arbitrary functions

C Tang, Y Chen - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Non-interactive verifiable outsourced computation enables a computationally weak client to
outsource the computation of a function $ f $ on input $ x $ to a more powerful but untrusted …

New verifiable outsourced computation scheme for an arbitrary function

C Xiang, C Tang - International Journal of Grid and Utility …, 2016 - inderscienceonline.com
We study the construction of efficient verifiable outsourced computation for arbitrary
functions. We improve previous verifiable outsourced computation schemes for arbitrary …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

Multi-client non-interactive verifiable computation

SG Choi, J Katz, R Kumaresan, C Cid - Theory of Cryptography …, 2013 - Springer
Abstract Gennaro et al.(Crypto 2010) introduced the notion of non-interactive verifiable
computation, which allows a computationally weak client to outsource the computation of a …

[PDF][PDF] Faster Non-interactive Verifiable Computing

P Lafourcade, G Marcadet, L Robert - Cryptology ePrint Archive, 2022 - scholar.archive.org
In 1986, A. Yao introduced the notion of garbled circuits, designed to verify the correctness
of computations performed on an untrusted server. However, correctness is guaranteed for …

Batch verifiable computation of polynomials on outsourced data

LF Zhang, R Safavi-Naini - … Symposium on Research in Computer Security, 2015 - Springer
Secure outsourcing of computation to cloud servers has attracted much attention in recent
years. In a typical outsourcing scenario, the client stores its data on a cloud server and later …

Verifiable outsourced computation over encrypted data

X Yu, Z Yan, R Zhang - Information Sciences, 2019 - Elsevier
In recent years, cloud computing has become the most popular and promising service
platform. A cloud user can outsource its heavy computation overhead to a cloud service …

Secure outsourced computation

J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of
theoretical cryptography. Since that time a number of papers have been published which …

EVOC: more efficient verifiable outsourced computation from any one-way trapdoor function

J Zhou, Z Cao, X Dong, X Lin - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Verifiable outsourced computation enables a computational resource-constrained mobile
device to outsource the computation of a function F on multiple inputs x 1,…, xn to the cloud …

Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions

LF Zhang, R Safavi-Naini - Designs, Codes and Cryptography, 2020 - Springer
Outsourcing computation has gained significant attention in recent years in particular due to
the prevalence of cloud computing. There are two main security concerns in outsourcing …