Results 21 to 30 of about 2,162 (138)
Verifying computations with state [PDF]
When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent work in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems.
Benjamin Braun +5 more
openaire +1 more source
Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj +1 more source
Verified Self-Explaining Computation [PDF]
Common programming tools, like compilers, debuggers, and IDEs, crucially rely on the ability to analyse program code to reason about its behaviour and properties. There has been a great deal of work on verifying compilers and static analyses, but far less on verifying dynamic analyses such as program slicing.
Stolarek, Jan, Cheney, James
openaire +4 more sources
Improved Resource State for Verifiable Blind Quantum Computation
Recent advances in theoretical and experimental quantum computing raise the problem of verifying the outcome of these quantum computations. The recent verification protocols using blind quantum computing are fruitful for addressing this problem ...
Qingshan Xu, Xiaoqing Tan, Rui Huang
doaj +1 more source
Verifiable Privacy-Preserving Computing
Privacy-preserving computation (PPC) methods, such as secure multiparty computation (MPC) and homomorphic encryption (HE), are deployed increasingly often to guarantee data confidentiality in computations over private, distributed data. Similarly, we observe a steep increase in the adoption of zero-knowledge proofs (ZKPs) to guarantee (public ...
Bontekoe, Tariq +2 more
openaire +2 more sources
Verifiable Computing Using Computation Fingerprints Within FHE [PDF]
We suggest using Fully Homomorphic Encryption (FHE) to be used, not only to keep the privacy of information but also, to verify computations with no additional significant overhead, using only part of the variables length for verification. This method supports the addition of encrypted values as well as multiplication of encrypted values by the ...
Dolev, Shlomi, Kalma, Arseni
openaire +2 more sources
Privacy-preserving verifiable delegation of polynomial and matrix functions
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj +1 more source
Verifying spatial properties of array computations [PDF]
Arrays computations are at the core of numerical modelling and computational science applications. However, low-level manipulation of array indices is a source of program error. Many practitioners are aware of the need to ensure program correctness, yet very few of the techniques from the programming research community are applied by scientists. We aim
Orchard, D +3 more
openaire +3 more sources
Context-Aware Verifiable Cloud Computing
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services.
Yu, Xixun, Ding, Wenxiu, Yan, Zheng
openaire +4 more sources
Verified Compilation of Floating-Point Computations [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Boldo, Sylvie +3 more
openaire +2 more sources

