Privately and Publicly Verifiable Computing Techniques

Privately and Publicly Verifiable Computing Techniques
Author :
Publisher : Springer
Total Pages : 66
Release :
ISBN-10 : 9783319537986
ISBN-13 : 3319537989
Rating : 4/5 (989 Downloads)

Book Synopsis Privately and Publicly Verifiable Computing Techniques by : Denise Demirel

Download or read book Privately and Publicly Verifiable Computing Techniques written by Denise Demirel and published by Springer. This book was released on 2017-03-27 with total page 66 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field.


Privately and Publicly Verifiable Computing Techniques Related Books

Privately and Publicly Verifiable Computing Techniques
Language: en
Pages: 66
Authors: Denise Demirel
Categories: Computers
Type: BOOK - Published: 2017-03-27 - Publisher: Springer

GET EBOOK

This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to
Information Security
Language: en
Pages: 520
Authors: Liqun Chen
Categories: Computers
Type: BOOK - Published: 2018-09-03 - Publisher: Springer

GET EBOOK

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 f
Cryptographic Obfuscation
Language: en
Pages: 122
Authors: Máté Horváth
Categories: Computers
Type: BOOK - Published: 2020-10-05 - Publisher: Springer Nature

GET EBOOK

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference f
Information Security Practice and Experience
Language: en
Pages: 618
Authors: Chunhua Su
Categories: Computers
Type: BOOK - Published: 2018-09-17 - Publisher: Springer

GET EBOOK

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo,
Information Systems Security
Language: en
Pages: 297
Authors: Salil Kanhere
Categories: Computers
Type: BOOK - Published: 2020-12-05 - Publisher: Springer Nature

GET EBOOK

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16