Results 241 to 250 of about 38,400 (270)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Confidentiality-Preserving Publicly Verifiable Computation
International Journal of Foundations of Computer Science, 2017Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has
Sun, Jiameng +4 more
openaire +2 more sources
Verifiable Outsourced Computation
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017I will review recent (and not so recent) research on the topic of Verifiable Outsourced Computation. The problem of verifying the correctness of computations done by untrusted parties was a driving motivation behind some of the most celebrated results in Complexity Theory in the 90's, from Interactive Proofs to the PCP Theorem.
openaire +1 more source
Verifiable Crowd Computing: Coping with Bounded Rationality
Theoretical Computer Science, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dong, Lu +2 more
openaire +2 more sources
Verified Computation of Fast Decreasing Polynomials
Reliable Computing, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dimitrova, Neli S., Markov, Svetoslav M.
openaire +2 more sources
Verifiable Encrypted Computations
"The ubiquitous usage of cloud computing has revolutionized the way individuals and organizations access and process their data. By delivering numerous services on the internet, cloud computing allows users to store vast amounts of data and perform heavy computations on them without the need to manage complex local computing resources.openaire +2 more sources
2016
In a verifiable computation VC scheme, a client asks a server to perform some outsourced computations, and the latter returns the results as its response. The results can be verified privately or publicly. Fiore and Gennaro CCS 2012 constructed publicly verifiable protocols for secure outsourcing polynomials and matrix computations.
Yujuan Sun +5 more
openaire +1 more source
In a verifiable computation VC scheme, a client asks a server to perform some outsourced computations, and the latter returns the results as its response. The results can be verified privately or publicly. Fiore and Gennaro CCS 2012 constructed publicly verifiable protocols for secure outsourcing polynomials and matrix computations.
Yujuan Sun +5 more
openaire +1 more source
Verifiable Computation of Large Polynomials
2015Due to the proliferation of powerful cloud service, verifiable computation, which makes a computationally weak client perform intensive computations possible through outsourcing tasks to a powerful server, is attracting increasing attention. The correctness of the returned result should be verified as the server may be not trusted. In this paper, we
Jiaqi Hong, Haixia Xu, Peili Li
openaire +1 more source

