Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this thesis, we study protocols for delegating computation in a model where one of the parties is rational. In our model, a delegator outsources the ...
In this thesis, we study protocols for delegating computation in a model where one of the parties is rational. In our model, a delegator outsources the ...
Title, Rationality and Efficient Verifiable Computation. Author, Matteo Campanelli. Publisher, City University of New York, 2018.
Abstract. We study the task of verifiable delegation of computation on encrypted data. We improve previous definitions in order to tolerate adversaries that ...
Sep 11, 2020 · SNARKs or (zk-SNARKs) support general computations,. i.e., they can be used to prove the correctness of arbitrary, polynomial-sized computation.
Feb 16, 2024 · This report describes the state of the art in verifiable computation. The problem being solved is the following: The Verifiable Computation ...
Abstract. We present new protocols for the verification of space bounded polytime computations against a rational adversary. For such.
If the goal is to solve privacy (and efficiency), then fully homomorphic encryption (FHE) is the answer. With FHE the server can receive data encrypted and ...
Missing: Rationality | Show results with:Rationality
To achieve efficient verifiable computation, Pinocchio combines quadratic programs, a computational model intro- duced by Gennaro et al. [30], with a series ...
This project aims to take advantage of this new model to design extremely efficient interactive proofs tailored for computation outsourcing. As part of this ...