-
1
A Hardware-Based Correct Execution Environment Supporting Virtual Memory
Izdano 2024-01-01Teme: Polni tekst
Article -
2
-
3
-
4
-
5
An efficient polynomial-based verifiable computation scheme on multi-source outsourced data
Izdano 2024-04-01“...To improve the efficiency, this paper proposes an efficient polynomial-based verifiable computation scheme on multi-source outsourced data. ...”
Polni tekst
Article -
6
Practical Cryptographically Private and Verifiable Computation through Hardware-Software Co-Design
Izdano 2024“...Fully Homomorphic Encryption (FHE) and Verifiable Computation (VC) enable offloading computation to untrusted servers with cryptographic privacy and integrity guarantees. ...”
Polni tekst
Thesis -
7
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Izdano 2024-04-01Teme: Polni tekst
Article -
8
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Izdano 2024-04-01Teme: Polni tekst
Article -
9
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Izdano 2024-04-01Teme: Polni tekst
Article -
10
More Efficient and Verifiable Privacy-Preserving Aggregation Scheme for Internet of Things-Based Federated Learning
Izdano 2024-06-01Teme: Polni tekst
Article -
11
-
12
PEEV: Parse Encrypt Execute Verify—A Verifiable FHE Framework
Izdano 2024-01-01Teme: Polni tekst
Article -
13
Certificateless-based efficient aggregate signature scheme with universal designated verifier
Izdano 2015-02-01Teme: “...aggregate signature;certificateless signature;universal designated verifier;computational Diffie-Hellman problem...”
Polni tekst
Article -
14
Investment Compliance in Hedge Funds using Zero Knowledge Proofs
Izdano 2021-04-01“...We propose a protocol to address this scenario using Zokrates, a framework for verifiable computation using Zk-SNARKs on Ethereum, to encode the constraints and export the verifier. ...”
Polni tekst
Article -
15
Shorter ZK-SNARKs from square span programs over ideal lattices
Izdano 2024-03-01“...Abstract Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn considerable attention for their appealing applications, e.g., verifiable computation and anonymous payment protocol. Compared with the pre-quantum case, the practicability of this primitive in the post-quantum setting is still unsatisfactory, especially for the space complexity. ...”
Polni tekst
Article -
16
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations
Izdano 2024-09-01“... Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebraic descriptions (constraints). ...”
Polni tekst
Article -
17
Skyscraper: Fast Hashing on Big Primes
Izdano 2025-03-01“... Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. ...”
Polni tekst
Article -
18
Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain
Izdano 2022“...During the data collection phase, by combining the homomorphic 2-DNF (Disjunctive Normal Form) cryptosystem and an identity-based signcryption scheme, our proposed scheme achieves the secure and verifiable computation of the average and variance of the collected vehicular sensory data. ...”
Polni tekst
Journal Article -
19
Rate-1 non-interactive arguments for batch-NP
Izdano 2022“...We also observe we can obtain an incrementally verifiable computation (IVC) scheme for arbitrary deterministic computations, even beyond P; a multi-hop BARG scheme for NP; and a multi-hop aggregate signature scheme, in the standard model, with unbounded and universal aggregation. ...”
Polni tekst
Thesis -
20
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs
Izdano 2024-09-01“...Due to its powerful capabilities, its most practical type, called zero-knowledge Succinct Non-interactive ARgument of Knowledge (zkSNARK), has been widely deployed in various privacypreserving applications such as cryptocurrencies and verifiable computation. Although state-of-the-art zkSNARKs are highly efficient for the verifier, the computational overhead for the prover is still orders of magnitude too high to warrant use in many applications. ...”
Polni tekst
Article