-
1
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
M. Backes, D. Fiore, and R. M. Reischuk. Verifiable delegation of computation on outsourced data. In CCS, pages 863-874, 2013.
-
(2013)
CCS
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
2
-
-
84884473761
-
SNARKs for C: Verifying program executions succinctly and in zero knowledge
-
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In CRYPTO (2), pages 90-108, 2013.
-
(2013)
CRYPTO (2)
, pp. 90-108
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
Virza, M.5
-
4
-
-
78650293375
-
High-speed software implementation of the optimal ate pairing over Barreto-naehrig curves
-
Springer
-
J.-L. Beuchat, J. E. González-Díaz, S. Mitsunari, E. Okamoto, F. Rodríguez-Henríquez, and T. Teruya. High-speed software implementation of the optimal ate pairing over Barreto-Naehrig curves. In Pairing, pages 21-39. Springer, 2010.
-
(2010)
Pairing
, pp. 21-39
-
-
Beuchat, J.-L.1
González-Díaz, J.E.2
Mitsunari, S.3
Okamoto, E.4
Rodríguez-Henríquez, F.5
Teruya, T.6
-
5
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In ITCS, pages 326-349, 2012.
-
(2012)
ITCS
, pp. 326-349
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
6
-
-
84879803522
-
Recursive composition and bootstrapping for SNARKS and proof-carrying data
-
N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer. Recursive composition and bootstrapping for SNARKS and proof-carrying data. In STOC, pages 111-120, 2013.
-
(2013)
STOC
, pp. 111-120
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
7
-
-
84873941196
-
Succinct non-interactive arguments via linear interactive proofs
-
N. Bitansky, A. Chiesa, Y. Ishai, R. Ostrovsky, and O. Paneth. Succinct non-interactive arguments via linear interactive proofs. In TCC, pages 315-333, 2013.
-
(2013)
TCC
, pp. 315-333
-
-
Bitansky, N.1
Chiesa, A.2
Ishai, Y.3
Ostrovsky, R.4
Paneth, O.5
-
8
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptology, 21(2), pages 149-177, 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
84889685086
-
Verifying computations with state
-
B. Braun, A. J. Feldman, Z. Ren, S. T. V. Setty, A. J. Blumberg, and M. Walfish. Verifying computations with state. In SOSP, pages 341-357, 2013.
-
(2013)
SOSP
, pp. 341-357
-
-
Braun, B.1
Feldman, A.J.2
Ren, Z.3
Setty, S.T.V.4
Blumberg, A.J.5
Walfish, M.6
-
10
-
-
84958530489
-
Verifiable set operations over outsourced databases
-
R. Canetti, O. Paneth, D. Papadopoulos, and N. Triandopoulos. Verifiable set operations over outsourced databases. In PKC, pages 113-130, 2014.
-
(2014)
PKC
, pp. 113-130
-
-
Canetti, R.1
Paneth, O.2
Papadopoulos, D.3
Triandopoulos, N.4
-
11
-
-
80051994919
-
Memory delegation
-
K.-M. Chung, Y. T. Kalai, F.-H. Liu, and R. Raz. Memory delegation. In CRYPTO, pages 151-168, 2011.
-
(2011)
CRYPTO
, pp. 151-168
-
-
Chung, K.-M.1
Kalai, Y.T.2
Liu, F.-H.3
Raz, R.4
-
12
-
-
77957002840
-
Improved delegation of computation using fully homo-morphic encryption
-
K.-M. Chung, Y. T. Kalai, and S. P. Vadhan. Improved delegation of computation using fully homo-morphic encryption. In CRYPTO, pages 483-501, 2010.
-
(2010)
CRYPTO
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.T.2
Vadhan, S.P.3
-
13
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, pages 465-482, 2010.
-
(2010)
CRYPTO
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
14
-
-
84883413063
-
Quadratic span programs and succinct NIZKs without PCPs
-
R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct NIZKs without PCPs. In EUROCRYPT, pages 626-645, 2013.
-
(2013)
EUROCRYPT
, pp. 626-645
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
Raykova, M.4
-
16
-
-
78650812215
-
Short pairing-based non-interactive zero-knowledge arguments
-
J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In ASIACRYPT, pages 321-340, 2010.
-
(2010)
ASIACRYPT
, pp. 321-340
-
-
Groth, J.1
-
18
-
-
33745160750
-
Privacy-preserving set operations
-
L. Kissner and D. X. Song. Privacy-preserving set operations. In CRYPTO, pages 241-257, 2005.
-
(2005)
CRYPTO
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
20
-
-
85080555049
-
TRUE-SET: Nearly practical verifiable set computations
-
A. E. Kosba, D. Papadopoulos, C. Papamanthou, M. F. Sayed, E. Shi, and N. Triandopoulos. TRUE-SET: Nearly practical verifiable set computations. Cryptology ePrint Archive, Report 2014/160, 2014. http://eprint.iacr.org/2014/160.
-
(2014)
Cryptology EPrint Archive, Report 2014/160
-
-
Kosba, A.E.1
Papadopoulos, D.2
Papamanthou, C.3
Sayed, M.F.4
Shi, E.5
Triandopoulos, N.6
-
21
-
-
0034854953
-
Computationally sound proofs
-
S. Micali. Computationally sound proofs. SIAM J. Comput., 30(4):1253-1298, 2000.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
22
-
-
80051963720
-
Optimal verification of operations on dynamic sets
-
C. Papamanthou, R. Tamassia, and N. Triandopoulos. Optimal verification of operations on dynamic sets. In CRYPTO, pages 91-110, 2011.
-
(2011)
CRYPTO
, pp. 91-110
-
-
Papamanthou, C.1
Tamassia, R.2
Triandopoulos, N.3
-
23
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
B. Parno, J. Howell, C. Gentry, and M. Raykova. Pinocchio: Nearly practical verifiable computation. In IEEE Symposium on Security and Privacy, pages 238-252, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
, pp. 238-252
-
-
Parno, B.1
Howell, J.2
Gentry, C.3
Raykova, M.4
-
24
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
B. Parno, M. Raykova, and V. Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In TCC, pages 422-439, 2012.
-
(2012)
TCC
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
25
-
-
84877694382
-
Resolving the conflict between generality and plausibility in verified computation
-
S. T. V. Setty, B. Braun, V. Vu, A. J. Blumberg, B. Parno, and M. Walfish. Resolving the conflict between generality and plausibility in verified computation. In EuroSys, pages 71-84, 2013.
-
(2013)
EuroSys
, pp. 71-84
-
-
Setty, S.T.V.1
Braun, B.2
Vu, V.3
Blumberg, A.J.4
Parno, B.5
Walfish, M.6
-
26
-
-
85180792160
-
Making argument systems for outsourced computation practical (sometimes)
-
S. T. V. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In NDSS, 2012.
-
(2012)
NDSS
-
-
Setty, S.T.V.1
McPherson, R.2
Blumberg, A.J.3
Walfish, M.4
-
28
-
-
0001465210
-
A new polynomial factorization algorithm and its implementation
-
V. Shoup. A new polynomial factorization algorithm and its implementation. Journal of Symbolic Computation, 20(4), pages 363-397, 1995.
-
(1995)
Journal of Symbolic Computation
, vol.20
, Issue.4
, pp. 363-397
-
-
Shoup, V.1
-
29
-
-
84881262940
-
A hybrid architecture for interactive verifiable computation
-
V. Vu, S. T. V. Setty, A. J. Blumberg, and M. Walfish. A hybrid architecture for interactive verifiable computation. In IEEE Symposium on Security and Privacy, pages 223-237, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
, pp. 223-237
-
-
Vu, V.1
Setty, S.T.V.2
Blumberg, A.J.3
Walfish, M.4
|