CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model

Y Wang, Y Guo, Z Guo, T Baker, W Liu - Future Generation Computer …, 2020 - Elsevier
The multi-tenant coexistence service mode makes the cloud-based scientific workflow
encounter the risks of being intruded. For this problem, we propose a CLoud scientific …

Rational proofs with multiple provers

J Chen, S McCauley, S Singh - … of the 2016 ACM Conference on …, 2016 - dl.acm.org
Interactive proofs model a world where a verifier delegates computation to an untrustworthy
prover, verifying the prover's claims before accepting them. These proofs have applications …

Fine-grained secure computation

M Campanelli, R Gennaro - Theory of Cryptography Conference, 2018 - Springer
This paper initiates a study of Fine Grained Secure Computation: ie the construction of
secure computation primitives against “moderately complex” adversaries. We present …

How to Make Rational Arguments Practical and Extractable

M Campanelli, C Ganesh, R Gennaro - Cryptology ePrint Archive, 2023 - eprint.iacr.org
We investigate proof systems where security holds against rational parties instead of
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …

Rational proofs against rational verifiers

K Inasawa, K Yasunaga - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive
proofs in which the prover is rational, and may deviate from the protocol for increasing his …

Efficient rational proofs for space bounded computations

M Campanelli, R Gennaro - Decision and Game Theory for Security: 8th …, 2017 - Springer
We present new protocols for the verification of space bounded polytime computations
against a rational adversary. For such computations requiring sublinear space our protocol …

Fair and rational delegation computation protocol

尹鑫, 田有亮, 王海龙 - Journal of Software, 2017 - jos.org.cn
传统委托计算的验证过程计算和通信开销较高, 且参与者要么诚实, 要么邪恶;
理性委托计算是引入理性参与者, 通过效用函数来保障计算结果的可靠性 …

Outsourcing computation: the minimal refereed mechanism

Y Kong, C Peikert, G Schoenebeck, B Tao - International Conference on …, 2019 - Springer
We consider a setting where a verifier with limited computation power delegates a resource
intensive computation task—which requires a T * S computation tableau—to two provers …

[PDF][PDF] 公平理性委托计算协议

尹鑫, 田有亮, 王海龙 - 软件学报, 2017 - jos.org.cn
传统委托计算的验证过程计算和通信开销较高, 且参与者要么诚实, 要么邪恶;
理性委托计算是引入理性参与者, 通过效用函数来保障计算结果的可靠性 …

Efficient rational proofs with strong utility-gap guarantees

J Chen, S McCauley, S Singh - … , SAGT 2018, Beijing, China, September 11 …, 2018 - Springer
As modern computing moves towards smaller devices and powerful cloud platforms, more
and more computation is being delegated to powerful service providers. Interactive proofs …