Secure outsourced computation

J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of
theoretical cryptography. Since that time a number of papers have been published which …

Secure outsourced computation

N Smart - US Patent App. 12/827,247, 2012 - Google Patents
0001. This invention relates to cryptography, and in par ticular relates to a method and a
system that allows out Sourced multi-party computation to be performed in a secure way …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

A framework for outsourcing of secure computation

TP Jakobsen, JB Nielsen, C Orlandi - Proceedings of the 6th edition of …, 2014 - dl.acm.org
We study the problem of how to efficiently outsource a sensitive computation on secret
inputs to a number of untrusted workers, under the assumption that at least one worker is …

Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, M Howald, Z Ren… - Cryptology ePrint …, 2014 - eprint.iacr.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

Efficient non-interactive verifiable outsourced computation for arbitrary functions

C Tang, Y Chen - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Non-interactive verifiable outsourced computation enables a computationally weak client to
outsource the computation of a function $ f $ on input $ x $ to a more powerful but untrusted …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

On securing untrusted clouds with cryptography

Y Chen, R Sion - Proceedings of the 9th annual ACM workshop on …, 2010 - dl.acm.org
In a recent interview, Whitfield Diffie argued that" the whole point of cloud computing is
economy" and while it is possible in principle for" computation to be done on encrypted …

[PDF][PDF] Secure outsourced computation in a multi-tenant cloud

S Kamara, M Raykova - IBM Workshop on Cryptography and Security in …, 2011 - cachin.com
We present a general-purpose protocol that enables a client to delegate the computation of
any function to a cluster of n machines in such a way that no adversary that corrupts at most …

Outsourcing multi-party computation

S Kamara, P Mohassel, M Raykova - Cryptology ePrint Archive, 2011 - eprint.iacr.org
We initiate the study of secure multi-party computation (MPC) in a server-aided setting,
where the parties have access to a single server that (1) does not have any input to the …