搜索结果: 1-10 共查到“军事学 Outsourced Computation”相关记录10条 . 查询时间(0.042 秒)
While expensive cryptographically verifiable computation aims at defeating malicious agents, many civil
purposes of outsourced computation tolerate a weaker notion of security, i.e., “lazy-but-honest...
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
cloud computing non-interactive outsourced computation verifiable outsourced computation
2016/1/9
Non-interactive verifiable outsourced computation enables a
computationally weak client to outsource the computation of a function
f on input x to a more powerful but untrusted server, who will retu...
Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
Cloud Computing Outsourced computation Matrix
2016/1/9
Linear algebra plays an important role in computer science,
especially in cryptography.Numerous cryptog-raphic protocols, scientific
computations, and numerical computations are based on linear alge...
Revocation in Publicly Verifiable Outsourced Computation
Publicly Verifiable Outsourced Computation Key Distribution Center Key-policy Attribute-based Encryption
2016/1/7
The combination of software-as-a-service and the increasing use of mobile devices gives
rise to a considerable difference in computational power between servers and clients. Thus,
there is a desire ...
Efficient RAM and control flow in verifiable outsourced computation
implementation applications of PCPs zero knowledge
2016/1/7
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems security: allowing
a l...
Access Control in Publicly Verifiable Outsourced Computation
Publicly Verifiable Outsourced Computation Access Control Policies Key Assignment Scheme
2016/1/7
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources
to delegate expensive computations to more powerful external servers, and to verify
the correctness of resul...
Privacy-Preserving Face Recognition with Outsourced Computation
applications Outsourced Computation
2016/1/5
Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data ra...
Incentivized Outsourced Computation Resistant to Malicious Contractors
Outsourced Computation Cloud Computation Crowdsourcing
2016/1/5
With the rise of Internet computing, outsourcing difficult computational tasks became an important need. Yet, once the computation is outsourced, the job owner loses control, and hence it is crucial t...
Incentivizing Outsourced Computation
game theory and cryptography cloud computation cloud computing mechanism design
2013/4/18
We describe different strategies a central authority, the boss, can use to distribute computation to untrusted contractors. Our problem is inspired by volunteer distributed computing projects such as ...
Today biometric data propagate more heavily into our lives. With more ubiquitous use of such data, computations over biometrics become more prevalent as well. While it is well understood that privacy ...