N Smart - US Patent App. 12/827,247, 2012 - Google Patents
0001. This invention relates to cryptography, and in par ticular relates to a method and a system that allows out Sourced multi-party computation to be performed in a secure way …
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore …
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is …
RS Wahby, S Setty, M Howald, Z Ren… - Cryptology ePrint …, 2014 - eprint.iacr.org
Recent work on proof-based verifiable computation has resulted in built systems that employ tools from complexity theory and cryptography to address a basic problem in systems …
C Tang, Y Chen - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Non-interactive verifiable outsourced computation enables a computationally weak client to outsource the computation of a function $ f $ on input $ x $ to a more powerful but untrusted …
The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Y Chen, R Sion - Proceedings of the 9th annual ACM workshop on …, 2010 - dl.acm.org
In a recent interview, Whitfield Diffie argued that" the whole point of cloud computing is economy" and while it is possible in principle for" computation to be done on encrypted …
S Kamara, M Raykova - IBM Workshop on Cryptography and Security in …, 2011 - cachin.com
We present a general-purpose protocol that enables a client to delegate the computation of any function to a cluster of n machines in such a way that no adversary that corrupts at most …
We initiate the study of secure multi-party computation (MPC) in a server-aided setting, where the parties have access to a single server that (1) does not have any input to the …