Verifiable computing

Results: 55



#Item
21Bitcoin / Peer-to-peer computing / Cloud infrastructure / Peer-to-peer / Azure Services Platform / Cloud storage / Scalability / Cloud computing / Computing / Centralized computing

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Kai Chen CSE, HKUST

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2014-07-01 23:45:38
22Mathematical logic / XOR gate / OR gate / Commitment scheme / Boolean circuit / AND gate / Exclusive or / Verifiable computing / Logic gates / Theoretical computer science / Mathematics

TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, and Roberto Trifiletti ???

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 01:46:16
23Oblivious transfer / Ciphertext indistinguishability / Verifiable computing / Cryptography / Homomorphic encryption / RSA

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
24Peer-to-peer computing / Client–server model / Server / Computation / Software / Computing / Bitcoin

VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-12 14:05:59
25Internet / Webmail / Mail / Secure messaging / I2P / Email / Computer-mediated communication / Computing

IncaMail Confidential and verifiable e-mailing. Powered by

Add to Reading List

Source URL: www.post.ch

Language: English
26Computing / Secure multi-party computation / Secure two-party computation / Cryptography / Zero-knowledge proof / Communications protocol / Internet privacy / Universal composability / Verifiable secret sharing / Cryptographic protocols / Data / Information

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
27Data / Data synchronization / Cryptographic protocols / Theory of computation / Replication / Verifiable secret sharing / Byzantine fault tolerance / Fault-tolerant system / Secret sharing / Computing / Fault-tolerant computer systems / Cryptography

Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:37:04
28System software / Computing / Verifiable secret sharing / Server hardware / Secret sharing / Server / Proactive secret sharing / X Window System / Cryptographic protocols / Software / Cryptography

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
29Public-key cryptography / Information-theoretic security / Verifiable secret sharing / Computer security / Cloud computing / Password / Secret sharing / Quantum cryptography / Trustworthy computing / Cryptography / Cryptographic protocols / Secure multi-party computation

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
30Computing / Human rights / Internet privacy / Information technology management / Identity management / P3P / View model / TRUSTe / Privacy / Ethics / Systems engineering

PRivacy Enabled Capability In Co-Operative Systems and Safety Applications Deliverable 7 V2X Privacy Verifiable Architecture

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2010-08-31 01:34:54
UPDATE