Results 21 to 30 of about 2,162 (138)

Verifying computations with state [PDF]

open access: yesProceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, 2013
When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent work in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems.
Benjamin Braun   +5 more
openaire   +1 more source

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Verified Self-Explaining Computation [PDF]

open access: yes, 2019
Common programming tools, like compilers, debuggers, and IDEs, crucially rely on the ability to analyse program code to reason about its behaviour and properties. There has been a great deal of work on verifying compilers and static analyses, but far less on verifying dynamic analyses such as program slicing.
Stolarek, Jan, Cheney, James
openaire   +4 more sources

Improved Resource State for Verifiable Blind Quantum Computation

open access: yesEntropy, 2020
Recent advances in theoretical and experimental quantum computing raise the problem of verifying the outcome of these quantum computations. The recent verification protocols using blind quantum computing are fruitful for addressing this problem ...
Qingshan Xu, Xiaoqing Tan, Rui Huang
doaj   +1 more source

Verifiable Privacy-Preserving Computing

open access: yes, 2023
Privacy-preserving computation (PPC) methods, such as secure multiparty computation (MPC) and homomorphic encryption (HE), are deployed increasingly often to guarantee data confidentiality in computations over private, distributed data. Similarly, we observe a steep increase in the adoption of zero-knowledge proofs (ZKPs) to guarantee (public ...
Bontekoe, Tariq   +2 more
openaire   +2 more sources

Verifiable Computing Using Computation Fingerprints Within FHE [PDF]

open access: yes2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), 2021
We suggest using Fully Homomorphic Encryption (FHE) to be used, not only to keep the privacy of information but also, to verify computations with no additional significant overhead, using only part of the variables length for verification. This method supports the addition of encrypted values as well as multiplication of encrypted values by the ...
Dolev, Shlomi, Kalma, Arseni
openaire   +2 more sources

Privacy-preserving verifiable delegation of polynomial and matrix functions

open access: yesJournal of Mathematical Cryptology, 2020
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj   +1 more source

Verifying spatial properties of array computations [PDF]

open access: yesProceedings of the ACM on Programming Languages, 2017
Arrays computations are at the core of numerical modelling and computational science applications. However, low-level manipulation of array indices is a source of program error. Many practitioners are aware of the need to ensure program correctness, yet very few of the techniques from the programming research community are applied by scientists. We aim
Orchard, D   +3 more
openaire   +3 more sources

Context-Aware Verifiable Cloud Computing

open access: yesIEEE Access, 2017
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services.
Yu, Xixun, Ding, Wenxiu, Yan, Zheng
openaire   +4 more sources

Verified Compilation of Floating-Point Computations [PDF]

open access: yesJournal of Automated Reasoning, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Boldo, Sylvie   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy