Results 31 to 40 of about 38,400 (270)
Privacy-preserving verifiable delegation of polynomial and matrix functions
Outsourcing computation has gained significant popularity in recent years due to the development of cloud computing and mobile services. In a basic outsourcing model, a client delegates computation of a function f on an input x to a server. There are two
Zhang Liang Feng, Safavi-Naini Reihaneh
doaj +1 more source
Revocation in Publicly Verifiable Outsourced Computation [PDF]
The combination of software-as-a-service and the increasing use of mobile devices gives rise to a considerable difference in computational power between servers and clients.
B Parno +4 more
core +3 more sources
Verifying spatial properties of array computations [PDF]
Arrays computations are at the core of numerical modelling and computational science applications. However, low-level manipulation of array indices is a source of program error. Many practitioners are aware of the need to ensure program correctness, yet very few of the techniques from the programming research community are applied by scientists. We aim
Orchard, D +3 more
openaire +3 more sources
Context-Aware Verifiable Cloud Computing
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services.
Yu, Xixun, Ding, Wenxiu, Yan, Zheng
openaire +4 more sources
PLTL Partitioned Model Checking for Reactive Systems under Fairness Assumptions [PDF]
We are interested in verifying dynamic properties of finite state reactive systems under fairness assumptions by model checking. The systems we want to verify are specified through a top-down refinement process.
Bellegarde, Françoise +3 more
core +3 more sources
Verified Compilation of Floating-Point Computations [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Boldo, Sylvie +3 more
openaire +2 more sources
Verifiable outsourced attribute-based encryption with access update
In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable ...
Suqing LIN
doaj +3 more sources
Delegatable homomorphic encryption with applications to secure outsourcing of computation [PDF]
In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing ...
A. Lewko +7 more
core +3 more sources
Outsourcing computing allows users with resource-constrained devices to outsource their complex computation workloads to cloud servers that may not be honest.
Shuai Li +3 more
doaj +1 more source
Reducing resources for verification of quantum computations [PDF]
We present two verification protocols where the correctness of a "target" computation is checked by means of "trap" computations that can be efficiently simulated on a classical computer.
Datta, Animesh +2 more
core +2 more sources

