메뉴 건너뛰기




Volumn , Issue , 2016, Pages 119-128

Efficient techniques for publicly verifiable delegation of computation

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING;

EID: 84979681531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2897845.2897910     Document Type: Conference Paper
Times cited : (52)

References (21)
  • 4
  • 5
    • 85075922906 scopus 로고    scopus 로고
    • Succinct non-interactive zero knowledge for a von Neumann architecture
    • Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. Succinct non-interactive zero knowledge for a Von Neumann architecture. In USENIX Security, pages 781-796, 2014.
    • (2014) USENIX Security , pp. 781-796
    • Ben-Sasson, E.1    Chiesa, A.2    Tromer, E.3    Virza, M.4
  • 8
    • 79958003537 scopus 로고    scopus 로고
    • Homomorphic signatures for polynomial functions
    • Springer
    • Dan Boneh and David Mandell Freeman. Homomorphic signatures for polynomial functions. In Advances in Cryptology-EUROCRYPT 2011, pages 149-168. Springer, 2011.
    • (2011) Advances in Cryptology-EUROCRYPT 2011 , pp. 149-168
    • Boneh, D.1    Freeman, D.M.2
  • 9
    • 84883564164 scopus 로고    scopus 로고
    • Practical homomorphic macs for arithmetic circuits
    • Springer
    • Dario Catalano and Dario Fiore. Practical homomorphic macs for arithmetic circuits. In EUROCRYPT, pages 336-352. Springer, 2013.
    • (2013) EUROCRYPT , pp. 336-352
    • Catalano, D.1    Fiore, D.2
  • 10
    • 84905409138 scopus 로고    scopus 로고
    • Homomorphic signatures with efficient verification for polynomial functions
    • Springer
    • Dario Catalano, Dario Fiore, and Bogdan Warinschi. Homomorphic signatures with efficient verification for polynomial functions. In Advances in Cryptology-CRYPTO 2014, pages 371-389. Springer, 2014.
    • (2014) Advances in Cryptology-CRYPTO 2014 , pp. 371-389
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 12
    • 84892393413 scopus 로고    scopus 로고
    • Fully homomorphic message authenticators
    • Springer
    • Rosario Gennaro and Daniel Wichs. Fully homomorphic message authenticators. In Advances in Cryptology-ASIACRYPT 2013, pages 301-320. Springer, 2013.
    • (2013) Advances in Cryptology-ASIACRYPT 2013 , pp. 301-320
    • Gennaro, R.1    Wichs, D.2
  • 13
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Springer
    • Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology-CRYPTO 2010, pages 465-482. Springer, 2010.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 14
    • 84883413063 scopus 로고    scopus 로고
    • Quadratic span programs and succinct NIZKs without PCPs
    • Springer
    • Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova. Quadratic span programs and succinct NIZKs without PCPs. In EUROCRYPT, volume 7881, pages 626-645. Springer, 2013.
    • (2013) EUROCRYPT , vol.7881 , pp. 626-645
    • Gennaro, R.1    Gentry, C.2    Parno, B.3    Raykova, M.4
  • 16
    • 78650828289 scopus 로고    scopus 로고
    • Constant-size commitments to polynomials and their applications
    • Springer
    • Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg. Constant-size commitments to polynomials and their applications. In Advances in Cryptology-ASIACRYPT 2010, pages 177-194. Springer, 2010.
    • (2010) Advances in Cryptology-ASIACRYPT 2010 , pp. 177-194
    • Kate, A.1    Zaverucha, G.M.2    Goldberg, I.3
  • 17
    • 84873975919 scopus 로고    scopus 로고
    • Signatures of correct computation
    • Springer
    • Charalampos Papamanthou, Elaine Shi, and Roberto Tamassia. Signatures of correct computation. In Theory of Cryptography, pages 222-242. Springer, 2013.
    • (2013) Theory of Cryptography , pp. 222-242
    • Papamanthou, C.1    Shi, E.2    Tamassia, R.3
  • 20
    • 84906483939 scopus 로고    scopus 로고
    • Verifiable delegation of computations with storage-verification trade-off
    • In Miroslaw Kutylowski and Jaideep Vaidya, editors, Springer International Publishing
    • Liang Feng Zhang and Reihaneh Safavi-Naini. Verifiable delegation of computations with storage-verification trade-off. In Miroslaw Kutylowski and Jaideep Vaidya, editors, Computer Security - ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pages 112-129. Springer International Publishing, 2014.
    • (2014) Computer Security - ESORICS 2014, Volume 8712 of Lecture Notes in Computer Science , pp. 112-129
    • Zhang, L.F.1    Safavi-Naini, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.