Privately and Publicly Verifiable Computing Techniques A Survey /
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Furthe...
| Main Authors: | Demirel, Denise (Author), Schabhüser, Lucas (Author), Buchmann, Johannes (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Homomorphic Signature Schemes A Survey /
by: Traverso, Giulia, et al.
Published: (2016) -
Cryptography Made Simple
by: Smart, Nigel P.
Published: (2016) -
Algebra for Cryptologists
by: Meijer, Alko R.
Published: (2016) -
Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings /
Published: (2009) -
Verifiable Composition of Signature and Encryption A Comprehensive Study of the Design Paradigms /
by: El Aimani, Laila
Published: (2017)