Secure large-scale outsourced services founded on trustworthy code executions

B Vavala - 2017 - search.proquest.com
Abstract The Cloud Computing model has incentivized companies to outsource services to
third-party providers. Service owners can use third-party computational, storage and network …

Succinct publicly auditable MPC with universal setup

SM Kanjalkar - 2020 - ideals.illinois.edu
In recent years, Multiparty computation as a service (MPCSaaS) is gaining popularity as a
promising approach for building privacy-preserving communication systems. Although there …

[PDF][PDF] Design of Extended Core Protocols

TS TUE, KB UT, V Botta, M Ciampi, A Kiayias, BS TUE… - 2019 - media.voog.com
A zero-knowledge argument is a cryptographic protocol between a prover and a verifier
where the objective is to prove the validity of some statement while not leaking any other …

Strategy of Digital Contents Archive Based on Reputation Model

H Kawano - 2008 19th International Conference on Systems …, 2008 - ieeexplore.ieee.org
The size of the information society is increasing exponentially, many public organizations
such as national libraries are making efforts top reserve born-digital scientific, artistic and …

Edit script verification with match operations and difference operations

MG Veeningen, B Schoenmakers… - US Patent 10,848,311, 2020 - Google Patents
Some embodiments are directed to a computation device configured to verify that an edit
script is for transforming a first string to a second string. The edit script has match operations …

Privacy-Preserving Credit Scoring Using Zero-Knowledge Proofs

C Park, J Kim, DH Lee - Journal of the Korea Institute of Information …, 2019 - koreascience.kr
In the current credit scoring system, the credit bureau gathers credit information from
financial institutions and calculates a credit score based on it. However, because all …

New (Zero-Knowledge) Arguments and Their Applications to Verifiable Computation

Y Zhang - 2018 - search.proquest.com
We study the problem of argument systems, where a computationally weak verifier
outsources the execution of a computation to a powerful but untrusted prover, while being …

[PDF][PDF] State of the Art on Privacy-Enhancing Cryptography for Ledgers

TK UT, M Ciampi, P Gazi, A Kiayias, HL UT, BS TUE… - 2018 - users.uoa.gr
Distributed ledgers or blockchains are a technology for storing data in a distributed manner,
that is, without a central storage while keeping a consensus about the contents of the data …

[PDF][PDF] Proof-of-work certificates that can be efficiently computed in the cloud

JG Dumas - 2018 - hal.science
In an emerging computing paradigm, computational capabilities, from processing power to
storage capacities, are offered to users over communication networks as a cloud-based …

[PDF][PDF] Report on Secure Information Sharing in the Cloud

AF SAP, AKT SAP, AB EMC - escudo-cloud.eu
This deliverable presents the contributions and findings that were produced by Tasks 1 to 4
under Work Package 3 (WP3). Within ESCUDO-CLOUD WP3 is focusing on formulating …