Verifiable computing

Results: 55



#Item
11Oblivious transfer / Secure multi-party computation / Information-theoretic security / Secret sharing / Distributed computing / Indocrypt / Commitment scheme / Asynchronous system / Cryptography / Cryptographic protocols / Verifiable secret sharing

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
12Algebra / Verifiable computing / NP / IP / Boolean algebra / Abstract algebra / Polynomials / Mathematics

2013 IEEE Symposium on Security and Privacy Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:30
13Compiler construction / Control flow / Compiler / Infinite loop / C / Static single assignment form / Software engineering / Computing / Computer programming

Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English
14Information / Hashing / World Wide Web / Data / Error detection and correction / Resource / Named graph / Hash list / RDFLib / Semantic Web / Cryptographic hash functions / Computing

Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data Tobias Kuhn1 and Michel Dumontier2 1 arXiv:1401.5775v3 [cs.CR] 28 May 2014

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-05-28 22:07:51
15Secret sharing / Computing / Proactive secret sharing / GiFT / Data / Kademlia / Network coding / Cryptographic protocols / Verifiable secret sharing / Software

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-01-17 23:19:33
16Secure multi-party computation / Homomorphic encryption / Computational complexity theory / Computing / Boolean circuit / Circuit / Mathematics / Verifiable computing / Secure two-party computation / Cryptographic protocols / Cryptography / Applied mathematics

Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 New Applications in the Internet of Things

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2015-01-12 23:28:56
17Secure multi-party computation / Computing / Universal composability / Communications protocol / Verifiable secret sharing / Boolean algebra / Π-calculus / Consensus / Cryptographic protocols / Data / Information

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-09-26 16:14:53
18Cryptography / Virtual synchrony / Consensus / State machine replication / Public-key cryptography / Verifiable secret sharing / Communications protocol / Internet Relay Chat / Computing / Fault-tolerant computer systems / Data

Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD. Telcordia Technologies, Piscataway, NJ.

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
19Security / Cyberwarfare / Cipher / Boolean circuit / Verifiable computing / Paillier cryptosystem / Cryptography / Homomorphic encryption / Applied mathematics

HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-02 17:15:17
20Distributed computing / Secure communication / Verifiable computing / Algorithm / Outsourcing / Academi / NP / General contractor / PP / Applied mathematics / Security / Business

Incentivized Outsourced Computation Resistant to Malicious Contractors Alptekin K¨ up¸cu ¨ Ko¸c University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 03:44:26
UPDATE