搜索结果: 1-7 共查到“军队指挥学 delegation of computation”相关记录7条 . 查询时间(0.085 秒)
Verifiable Delegation of Computation on Outsourced Data
Verifiable Delegation of Computation CloudComputing
2014/3/11
We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function on some portion o...
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
cryptographic protocol delegation of computation verifiable electronic voting
2013/2/21
This paper presents some proposals of protocols for two types of schemes such as verifiable delegation of computation and remote electronic voting, based on polynomial properties. Our protocols for ve...
Publicly Verifiable Delegation of Computation
public-key cryptography verifiable computation
2012/3/21
We initiate the study of \textit{publicly verifiable computation}, which generalizes authenticated data structures, and verifiable computation in the secret-key setting. In publicly verifiable computa...
Publicly Verifiable Delegation of Computation
public-key cryptography / verifiable computation
2012/3/23
We initiate the study of \textit{publicly verifiable computation}, which generalizes authenticated data structures, and verifiable computation in the secret-key setting. In publicly verifiable computa...
Two 1-Round Protocols for Delegation of Computation
cryptographic protocols / verifiable computation delegation of computation
2012/3/26
Consider a weak client that wishes to delegate computation to an untrusted server and be able to succinctly verify the correctness of the result, all within one round of interaction. We provide soluti...
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs
Shafi Goldwasser Huijia Lin Aviad Rubinstein
2012/3/26
We present a designated verifier CS proof system for polynomial time computations. The proof system can only be verified by a designated verifier: one who has published a public-key for which it knows...
Verifiable Delegation of Computation over Large Datasets
cryptographic protocols / verifiable computation diffie-hellman bilinear maps
2012/3/29
We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of \emph{amortized verifiable computation} introduced by Gennaro, Gentry, and Parno i...