Results 221 to 230 of about 2,281 (257)
A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability. [PDF]
Kho YX, Heng SH, Tan SY, Chin JJ.
europepmc +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Confidentiality-Preserving Publicly Verifiable Computation
International Journal of Foundations of Computer Science, 2017Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has
Sun, Jiameng +4 more
openaire +2 more sources
Verifiable Outsourced Computation
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017I will review recent (and not so recent) research on the topic of Verifiable Outsourced Computation. The problem of verifying the correctness of computations done by untrusted parties was a driving motivation behind some of the most celebrated results in Complexity Theory in the 90's, from Interactive Proofs to the PCP Theorem.
openaire +1 more source
Verifiable Crowd Computing: Coping with Bounded Rationality
Theoretical Computer Science, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dong, Lu +2 more
openaire +2 more sources
Verified Computation of Fast Decreasing Polynomials
Reliable Computing, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dimitrova, Neli S., Markov, Svetoslav M.
openaire +2 more sources

