Results 1 to 10 of about 2,178 (191)

RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing [PDF]

open access: yesSensors, 2022
With publicly verifiable computation (PVC) development, users with limited resources prefer to outsource computing tasks to cloud servers. However, existing PVC schemes are mainly proposed for cloud computing scenarios, which brings bandwidth consumption
Zi Jiao   +3 more
doaj   +2 more sources

Privacy-preserving and verifiable spectral graph analysis in the cloud [PDF]

open access: yesScientific Reports
Resorting to cloud computing for spectral graph analysis on large-scale graph data is becoming increasingly popular. However, given the intrusive and opaque natures of cloud services, privacy, and misbehaving cloud that returns incorrect results have ...
Yuzhao Song
doaj   +2 more sources

An efficient polynomial-based verifiable computation scheme on multi-source outsourced data [PDF]

open access: yesScientific Reports
With the development of cloud computing, users are more inclined to outsource complex computing tasks to cloud servers with strong computing capacity, and the cloud returns the final calculation results.
Yiran Zhang   +4 more
doaj   +2 more sources

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Multikey Verifiable Homomorphic Encryption

open access: yesIEEE Access, 2022
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj   +1 more source

Analysis and Application of Verifiable Computation Techniques in Blockchain Systems for the Energy Sector

open access: yesFrontiers in Blockchain, 2021
The energy system is becoming increasingly decentralized. This development requires integrating and coordinating a rising number of actors and small units in a complex system.
Andreas Zeiselmair    +7 more
doaj   +1 more source

A Verifiable Access Control Scheme for Mobile Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2016
In order to meet the secure requirements of data sharing in mobile cloud storage environment,a verifiable access control scheme based on Ciphertext-policy Attribute-based Encryption(CP-ABE) is proposed from the aspects of data security access control and
WANG Qian,XIONG Shuming
doaj   +1 more source

A Fair, Verifiable and Privacy-Protecting Data Outsourcing Transaction Scheme Based on Smart Contracts

open access: yesIEEE Access, 2022
The continuous production of large-scale data makes data outsourcing computation a trend. In order to ensure that data outsourcing transaction is trusted and fair, it needs the supervision and judgment of a third party.
Lina Li   +4 more
doaj   +1 more source

Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment

open access: yesIEEE Access, 2020
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee   +4 more
doaj   +1 more source

Verifiable Quantum Cloud Computation Scheme Based on Blind Computation

open access: yesIEEE Access, 2020
In this paper, we propose a verifiable quantum cloud computation scheme based on blind quantum computation which effectively solves the privacy and verifiability problem for clients when interfacing with quantum computer in cloud computation.
Jing Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy