Showing 1 - 20 results of 49 for search '"verifiable computation"', čas poizvedbe: 0.21s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    An efficient polynomial-based verifiable computation scheme on multi-source outsourced data od Yiran Zhang, Huizheng Geng, Li Su, Shen He, Li Lu

    Izdano 2024-04-01
    “...To improve the efficiency, this paper proposes an efficient polynomial-based verifiable computation scheme on multi-source outsourced data. ...”
    Polni tekst
    Article
  6. 6

    Practical Cryptographically Private and Verifiable Computation through Hardware-Software Co-Design od Samardzic, Nikola

    Izdano 2024
    “...Fully Homomorphic Encryption (FHE) and Verifiable Computation (VC) enable offloading computation to untrusted servers with cryptographic privacy and integrity guarantees. ...”
    Polni tekst
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Certificateless-based efficient aggregate signature scheme with universal designated verifier od Yu-lei ZHANG, Dong-rui ZHOU, Chen-yi LI, Yong-jie ZHANG, Cai-fen WANG

    Izdano 2015-02-01
    Teme: “...aggregate signature;certificateless signature;universal designated verifier;computational Diffie-Hellman problem...”
    Polni tekst
    Article
  14. 14

    Investment Compliance in Hedge Funds using Zero Knowledge Proofs od Komal Kalra, Sandeep Kumar Shukla, Shubham Sahai

    Izdano 2021-04-01
    “...We propose a protocol to address this scenario using Zokrates, a framework for verifiable computation using Zk-SNARKs on Ethereum, to encode the constraints and export the verifier. ...”
    Polni tekst
    Article
  15. 15

    Shorter ZK-SNARKs from square span programs over ideal lattices od Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang

    Izdano 2024-03-01
    “...Abstract Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn considerable attention for their appealing applications, e.g., verifiable computation and anonymous payment protocol. Compared with the pre-quantum case, the practicability of this primitive in the post-quantum setting is still unsatisfactory, especially for the space complexity. ...”
    Polni tekst
    Article
  16. 16

    Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations od Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch

    Izdano 2024-09-01
    “... Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebraic descriptions (constraints). ...”
    Polni tekst
    Article
  17. 17

    Skyscraper: Fast Hashing on Big Primes od Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger

    Izdano 2025-03-01
    “... Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. ...”
    Polni tekst
    Article
  18. 18

    Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain od Kong, Qinglei, Su, Le, Ma, Maode

    Izdano 2022
    “...During the data collection phase, by combining the homomorphic 2-DNF (Disjunctive Normal Form) cryptosystem and an identity-based signcryption scheme, our proposed scheme achieves the secure and verifiable computation of the average and variance of the collected vehicular sensory data. ...”
    Polni tekst
    Journal Article
  19. 19

    Rate-1 non-interactive arguments for batch-NP od Devadas, Lalita

    Izdano 2022
    “...We also observe we can obtain an incrementally verifiable computation (IVC) scheme for arbitrary deterministic computations, even beyond P; a multi-hop BARG scheme for NP; and a multi-hop aggregate signature scheme, in the standard model, with unbounded and universal aggregation. ...”
    Polni tekst
    Thesis
  20. 20

    Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs od Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou

    Izdano 2024-09-01
    “...Due to its powerful capabilities, its most practical type, called zero-knowledge Succinct Non-interactive ARgument of Knowledge (zkSNARK), has been widely deployed in various privacypreserving applications such as cryptocurrencies and verifiable computation. Although state-of-the-art zkSNARKs are highly efficient for the verifier, the computational overhead for the prover is still orders of magnitude too high to warrant use in many applications. ...”
    Polni tekst
    Article