Verifiable Outsourced Computation: A Survey

被引:2
|
作者
Gennaro, Rosario [1 ]
机构
[1] CUNY City Coll, Ctr Algorithms, New York, NY 10031 USA
关键词
D O I
10.1145/3087801.3087872
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:313 / 313
页数:1
相关论文
共 50 条
  • [1] Verifiable Outsourced Computation with Full Delegation
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Zifeng
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 270 - 287
  • [2] Batch verifiable computation of outsourced functions
    Liang Feng Zhang
    Reihaneh Safavi-Naini
    [J]. Designs, Codes and Cryptography, 2015, 77 : 563 - 585
  • [3] Revocation in Publicly Verifiable Outsourced Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 51 - 71
  • [4] Batch verifiable computation of outsourced functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 563 - 585
  • [5] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [6] Towards Verifiable Resource Accounting for Outsourced Computation
    Chen, Chen
    Maniatis, Petros
    Perrig, Adrian
    Vasudevan, Amit
    Sekar, Vyas
    [J]. ACM SIGPLAN NOTICES, 2013, 48 (07) : 167 - 178
  • [7] Batch Verifiable Computation of Polynomials on Outsourced Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 167 - 185
  • [8] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    [J]. INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [9] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [10] Efficient RAM and Control Flow in Verifiable Outsourced Computation
    Wahby, Riad S.
    Setty, Srinath
    Ren, Zuocheng
    Blumberg, Andrew J.
    Walfish, Michael
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,