Revocation in Publicly Verifiable Outsourced Computation
From MaRDI portal
Publication:3454572
DOI10.1007/978-3-319-16745-9_4zbMath1400.94110OpenAlexW231770548MaRDI QIDQ3454572
Carlos Cid, Christian Janson, Jason Crampton, James Alderman
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_4
revocationkey-policy attribute-based encryptionkey distribution centerpublicly verifiable outsourced computation
Related Items (4)
Revocation in Publicly Verifiable Outsourced Computation ⋮ Universally Composable Cryptographic Role-Based Access Control ⋮ Confidentiality-Preserving Publicly Verifiable Computation ⋮ Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
Cites Work
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
- Revocation in Publicly Verifiable Outsourced Computation
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- Multi-Client Non-interactive Verifiable Computation
- Fully homomorphic encryption using ideal lattices
- Multi-input Functional Encryption
This page was built for publication: Revocation in Publicly Verifiable Outsourced Computation