Privately and Publicly Verifiable Computing Techniques A Survey /
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Furthe...
Main Authors: | , , |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Series: | SpringerBriefs in Computer Science,
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Introduction
- Preliminaries
- Proof Based Verifiable Computing
- Verifiable Computing from Fully Homomorphic Encryption
- Homomorphic Authenticators
- Verifiable Computing Frameworks from Functional Encryption and Functional Signatures
- Verifiable Computing for Specific Applications
- Analysis of the State of the Art
- Conclusion.