Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Top Cited Papers
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- Vol. 2009, 465-482
- https://doi.org/10.1007/978-3-642-14623-7_25
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- Bounded Key-Dependent Message SecurityLecture Notes in Computer Science, 2010
- Fully homomorphic encryption using ideal latticesPublished by Association for Computing Machinery (ACM) ,2009
- Incentivizing outsourced computationPublished by Association for Computing Machinery (ACM) ,2008
- Delegating computationPublished by Association for Computing Machinery (ACM) ,2008
- How to Securely Outsource Cryptographic ComputationsLecture Notes in Computer Science, 2005
- SETI@homeCommunications of the ACM, 2002
- On the (Im)possibility of Obfuscating ProgramsLecture Notes in Computer Science, 2001
- Wallet Databases with ObserversPublished by Springer Science and Business Media LLC ,2001
- Uncheatable Distributed ComputationsLecture Notes in Computer Science, 2001
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989