Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption - MaRDI portal

How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption

From MaRDI portal
Publication:2891498

DOI10.1007/978-3-642-28914-9_24zbMath1304.68043OpenAlexW167928972MaRDI QIDQ2891498

Vinod Vaikuntanathan, Bryan Parno, Mariana Raykova

Publication date: 15 June 2012

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_24




Related Items (41)

Revocation in Publicly Verifiable Outsourced ComputationAttribute-based versions of Schnorr and ElGamalVerifiable Computation for Randomized AlgorithmArguments of ProximityBilinear Entropy Expansion from the Decisional Linear AssumptionSNARGs for P from sub-exponential DDH and QRSecure outsourcing of modular exponentiations under single untrusted programme modelIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsVerifiable inner product computation on outsourced database for authenticated multi-user data sharingBatch verifiable computation of outsourced functionsCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinNon-interactive publicly-verifiable delegation of committed programsMulti-key Homomorphic AuthenticatorsDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsFunction-Dependent Commitments for Verifiable Multi-party ComputationAn Efficient and Provably Secure Private Polynomial Evaluation SchemeGame-Theoretic Analysis of an Incentivized Verifiable Computation SystemZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingConfidentiality-Preserving Publicly Verifiable ComputationPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudEfficient algorithms for secure outsourcing of bilinear pairingsFine-grained searchable encryption in multi-user settingAlgebraic (trapdoor) one-way functions: constructions and applicationsTrusted computing with addition machines. IIEfficient computation outsourcing for inverting a class of homomorphic functionsPractical homomorphic message authenticators for arithmetic circuitsPublicly verifiable searchable symmetric encryption based on efficient cryptographic componentsNew publicly verifiable computation for batch matrix multiplicationPrivacy-preserving verifiable delegation of polynomial and matrix functionsNo-signaling linear PCPsNo-signaling linear PCPsMulti-input Functional Encryption and Its Application in Outsourcing ComputationMulti-server verifiable delegation of computations: unconditional security and practical efficiencyCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsProxy Re-encryption with Delegatable VerifiabilityBoosting verifiable computation on encrypted dataProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsFlexible and efficient verifiable computation on encrypted dataConstant-Round Interactive Proofs for Delegating Computation




This page was built for publication: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption