Results 11 to 20 of about 38,078 (177)

RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing [PDF]

open access: yesSensors, 2022
With publicly verifiable computation (PVC) development, users with limited resources prefer to outsource computing tasks to cloud servers. However, existing PVC schemes are mainly proposed for cloud computing scenarios, which brings bandwidth consumption
Zi Jiao   +3 more
doaj   +2 more sources

Unconditionally verifiable blind computation [PDF]

open access: yes, 2014
Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can
A. Ambainis   +15 more
core   +6 more sources

Hybrid Publicly Verifiable Computation [PDF]

open access: yes, 2016
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate com-putations to more powerful servers, and to verify the correctness of results.
Alderman, James   +3 more
core   +3 more sources

Privacy-preserving and verifiable spectral graph analysis in the cloud [PDF]

open access: yesScientific Reports
Resorting to cloud computing for spectral graph analysis on large-scale graph data is becoming increasingly popular. However, given the intrusive and opaque natures of cloud services, privacy, and misbehaving cloud that returns incorrect results have ...
Yuzhao Song
doaj   +2 more sources

An efficient polynomial-based verifiable computation scheme on multi-source outsourced data [PDF]

open access: yesScientific Reports
With the development of cloud computing, users are more inclined to outsource complex computing tasks to cloud servers with strong computing capacity, and the cloud returns the final calculation results.
Yiran Zhang   +4 more
doaj   +2 more sources

Device-independent verifiable blind quantum computation [PDF]

open access: yes, 2015
As progress on experimental quantum processors continues to advance, the problem of verifying the correct operation of such devices is becoming a pressing concern. The recent discovery of protocols for verifying computation performed by entangled but non-
Fitzsimons, Joseph F   +2 more
core   +4 more sources

Secure Collaborative Publicly Verifiable Computation

open access: yesIEEE Access, 2017
Publicly Verifiable Computation (PVC) enables computationally weak trusted sources to outsource several computations to some more powerful public untrusted clouds.
Qiang Wang   +4 more
doaj   +2 more sources

How to Verify a Quantum Computation

open access: yes, 2018
We give a new theoretical solution to a leading-edge experimental challenge, namely to the verification of quantum computations in the regime of high computational complexity.
Broadbent, Anne
core   +3 more sources

Multi-matrix verifiable computation [PDF]

open access: yesCluster Computing, 2020
The problem of securely outsourcing computation to cloud servers has attracted a large amount of attention in recent years. The verifiable computation of Gennaro, Gentry, Parno (Crypto'10) allows a client to verify the server's computation of a function with substantially less time than performing the outsourced computation from scratch.
Yan He, Liang Feng Zhang
openaire   +2 more sources

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy