Results 31 to 40 of about 38,400 (270)

Privacy-preserving verifiable delegation of polynomial and matrix functions

open access: yesJournal of Mathematical Cryptology, 2020
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj   +1 more source

Revocation in Publicly Verifiable Outsourced Computation [PDF]

open access: yes, 2014
The combination of software-as-a-service and the increasing use of mobile devices gives rise to a considerable difference in computational power between servers and clients.
B Parno   +4 more
core   +3 more sources

Verifying spatial properties of array computations [PDF]

open access: yesProceedings of the ACM on Programming Languages, 2017
Arrays computations are at the core of numerical modelling and computational science applications. However, low-level manipulation of array indices is a source of program error. Many practitioners are aware of the need to ensure program correctness, yet very few of the techniques from the programming research community are applied by scientists. We aim
Orchard, D   +3 more
openaire   +3 more sources

Context-Aware Verifiable Cloud Computing

open access: yesIEEE Access, 2017
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services.
Yu, Xixun, Ding, Wenxiu, Yan, Zheng
openaire   +4 more sources

PLTL Partitioned Model Checking for Reactive Systems under Fairness Assumptions [PDF]

open access: yes, 2005
We are interested in verifying dynamic properties of finite state reactive systems under fairness assumptions by model checking. The systems we want to verify are specified through a top-down refinement process.
Bellegarde, Françoise   +3 more
core   +3 more sources

Verified Compilation of Floating-Point Computations [PDF]

open access: yesJournal of Automated Reasoning, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Boldo, Sylvie   +3 more
openaire   +2 more sources

Verifiable outsourced attribute-based encryption with access update

open access: yes网络与信息安全学报, 2019
In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable ...
Suqing LIN
doaj   +3 more sources

Delegatable homomorphic encryption with applications to secure outsourcing of computation [PDF]

open access: yes, 2011
In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing ...
A. Lewko   +7 more
core   +3 more sources

CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server

open access: yesDigital Communications and Networks, 2017
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.
Shuai Li   +3 more
doaj   +1 more source

Reducing resources for verification of quantum computations [PDF]

open access: yes, 2018
We present two verification protocols where the correctness of a "target" computation is checked by means of "trap" computations that can be efficiently simulated on a classical computer.
Datta, Animesh   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy