搜索结果: 1-5 共查到“军事学 Verifiable Delegation of Computation”相关记录5条 . 查询时间(0.093 秒)
Verifiable Delegation of Computation on Outsourced Data
Verifiable Delegation of Computation CloudComputing
2014/3/11
We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function on some portion o...
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
cryptographic protocol delegation of computation verifiable electronic voting
2013/2/21
This paper presents some proposals of protocols for two types of schemes such as verifiable delegation of computation and remote electronic voting, based on polynomial properties. Our protocols for ve...
Publicly Verifiable Delegation of Computation
public-key cryptography verifiable computation
2012/3/21
We initiate the study of \textit{publicly verifiable computation}, which generalizes authenticated data structures, and verifiable computation in the secret-key setting. In publicly verifiable computa...
Publicly Verifiable Delegation of Computation
public-key cryptography / verifiable computation
2012/3/23
We initiate the study of \textit{publicly verifiable computation}, which generalizes authenticated data structures, and verifiable computation in the secret-key setting. In publicly verifiable computa...
Verifiable Delegation of Computation over Large Datasets
cryptographic protocols / verifiable computation diffie-hellman bilinear maps
2012/3/29
We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of \emph{amortized verifiable computation} introduced by Gennaro, Gentry, and Parno i...