Verifiable computing

Results: 55



#Item
31Routing protocols / Routing / Internet protocols / Internet standards / Border Gateway Protocol / Route filtering / Router / Autonomous system / Route Views / Network architecture / Internet / Computing

Private and Verifiable Interdomain Routing Decisions Mingchen Zhao Wenchao Zhou Alexander J. T. Gurney

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-07-30 10:52:47
32Peer-to-peer computing / Client–server model / Server / Computation / Software / Computing / Bitcoin

VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
33Computing / Treap / Binary search tree / B-tree / Tree / Self-balancing binary search tree / T-tree / R-tree / Trie / Binary trees / Graph theory / Data management

Abstract Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server t

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:04:54
34Secure multi-party computation / Verifiable computing / Paillier cryptosystem / Cryptography / Cryptographic protocols / Homomorphic encryption

Cryptography Research Group X0 X1

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-08-27 15:09:41
35Secret sharing / Computing / Proactive secret sharing / GiFT / Data / Kademlia / Network coding / Cryptographic protocols / Verifiable secret sharing / Software

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
36Algebra / Verifiable computing / Function / XTR / Factorization of polynomials over a finite field and irreducibility tests / Abstract algebra / Mathematics / Polynomials

Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research Craig Gentry

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-03-06 18:09:31
37One-way function / Public-key cryptography / Verifiable computing / Cryptography / Homomorphic encryption / Cipher

Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-12 22:36:25
38Secret sharing / Computing / Proactive secret sharing / GiFT / Data / Kademlia / Network coding / Cryptographic protocols / Verifiable secret sharing / Software

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
39Information / Failure / Fault tolerance / Theory of computation / Cryptographic protocols / Verifiable secret sharing / Secure multi-party computation / Communications protocol / Byzantine fault tolerance / Cryptography / Data / Computing

Fault-Tolerant Distributed Computing in Full-Information Networks Shafi Goldwasser∗ CSAIL, MIT Cambridge MA, USA Elan Pavlov

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:28:28
UPDATE