-
1
-
-
84979687447
-
Revocation in publicly verifiable outsourced computation
-
Springer
-
James Alderman, Christian Janson, Carlos Cid, and Jason Crampton. Revocation in publicly verifiable outsourced computation. In Information Security and Cryptology, pages 51-71. Springer, 2014.
-
(2014)
Information Security and Cryptology
, pp. 51-71
-
-
Alderman, J.1
Janson, C.2
Cid, C.3
Crampton, J.4
-
2
-
-
84942531925
-
Access control in publicly verifiable outsourced computation
-
James Alderman, Christian Janson, Carlos Cid, and Jason Crampton. Access control in publicly verifiable outsourced computation. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS, volume 15, pages 657-662, 2015.
-
(2015)
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS
, vol.15
, pp. 657-662
-
-
Alderman, J.1
Janson, C.2
Cid, C.3
Crampton, J.4
-
4
-
-
84884473761
-
SNARKs for C: Verifying program executions succinctly and in zero knowledge
-
Springer
-
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In Advances in Cryptology-CRYPTO 2013, pages 90-108. Springer, 2013.
-
(2013)
Advances in Cryptology-CRYPTO 2013
, pp. 90-108
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
Virza, M.5
-
5
-
-
85075922906
-
Succinct non-interactive zero knowledge for a von Neumann architecture
-
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. Succinct non-interactive zero knowledge for a Von Neumann architecture. In USENIX Security, pages 781-796, 2014.
-
(2014)
USENIX Security
, pp. 781-796
-
-
Ben-Sasson, E.1
Chiesa, A.2
Tromer, E.3
Virza, M.4
-
6
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Springer Berlin Heidelberg
-
Siavosh Benabbas, Rosario Gennaro, and Yevgeniy Vahlis. Verifiable delegation of computation over large datasets. In Phillip Rogaway, editor, Advances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 111-131. Springer Berlin Heidelberg, 2011.
-
(2011)
Phillip Rogaway, Editor, Advances in Cryptology - CRYPTO 2011, Volume 6841 of Lecture Notes in Computer Science
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
7
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
ACM
-
Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pages 326-349. ACM, 2012.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
, pp. 326-349
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
8
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
Springer
-
Dan Boneh and David Mandell Freeman. Homomorphic signatures for polynomial functions. In Advances in Cryptology-EUROCRYPT 2011, pages 149-168. Springer, 2011.
-
(2011)
Advances in Cryptology-EUROCRYPT 2011
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.M.2
-
9
-
-
84883564164
-
Practical homomorphic macs for arithmetic circuits
-
Springer
-
Dario Catalano and Dario Fiore. Practical homomorphic macs for arithmetic circuits. In EUROCRYPT, pages 336-352. Springer, 2013.
-
(2013)
EUROCRYPT
, pp. 336-352
-
-
Catalano, D.1
Fiore, D.2
-
10
-
-
84905409138
-
Homomorphic signatures with efficient verification for polynomial functions
-
Springer
-
Dario Catalano, Dario Fiore, and Bogdan Warinschi. Homomorphic signatures with efficient verification for polynomial functions. In Advances in Cryptology-CRYPTO 2014, pages 371-389. Springer, 2014.
-
(2014)
Advances in Cryptology-CRYPTO 2014
, pp. 371-389
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
13
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Springer
-
Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology-CRYPTO 2010, pages 465-482. Springer, 2010.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
14
-
-
84883413063
-
Quadratic span programs and succinct NIZKs without PCPs
-
Springer
-
Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova. Quadratic span programs and succinct NIZKs without PCPs. In EUROCRYPT, volume 7881, pages 626-645. Springer, 2013.
-
(2013)
EUROCRYPT
, vol.7881
, pp. 626-645
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
Raykova, M.4
-
16
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
Springer
-
Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg. Constant-size commitments to polynomials and their applications. In Advances in Cryptology-ASIACRYPT 2010, pages 177-194. Springer, 2010.
-
(2010)
Advances in Cryptology-ASIACRYPT 2010
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
18
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Springer Berlin Heidelberg
-
Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In Ronald Cramer, editor, Theory of Cryptography, volume 7194 of Lecture Notes in Computer Science, pages 422-439. Springer Berlin Heidelberg, 2012.
-
(2012)
Ronald Cramer, Editor, Theory of Cryptography, Volume 7194 of Lecture Notes in Computer Science
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
19
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
IEEE
-
Bryan Parno, Jon Howell, Craig Gentry, and Mariana Raykova. Pinocchio: Nearly practical verifiable computation. In IEEE Symposium on Security and Privacy (SP), 2013, pages 238-252. IEEE, 2013.
-
(2013)
IEEE Symposium on Security and Privacy (SP), 2013
, pp. 238-252
-
-
Parno, B.1
Howell, J.2
Gentry, C.3
Raykova, M.4
-
20
-
-
84906483939
-
Verifiable delegation of computations with storage-verification trade-off
-
In Miroslaw Kutylowski and Jaideep Vaidya, editors, Springer International Publishing
-
Liang Feng Zhang and Reihaneh Safavi-Naini. Verifiable delegation of computations with storage-verification trade-off. In Miroslaw Kutylowski and Jaideep Vaidya, editors, Computer Security - ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pages 112-129. Springer International Publishing, 2014.
-
(2014)
Computer Security - ESORICS 2014, Volume 8712 of Lecture Notes in Computer Science
, pp. 112-129
-
-
Zhang, L.F.1
Safavi-Naini, R.2
|