共 50 条
- [21] Efficiently Verifiable Computation on Encrypted Data [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 844 - 855
- [23] Verifiable Local Computation on Distributed Data [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 3 - 10
- [25] Multi-matrix verifiable computation [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01): : 475 - 488
- [26] Verifiable Computation on Outsourced Encrypted Data [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
- [27] Efficient Proof Composition for Verifiable Computation [J]. COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 152 - 171
- [29] Verifiable Outsourced Computation with Full Delegation [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 270 - 287
- [30] Revocation in Publicly Verifiable Outsourced Computation [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 51 - 71