Verifiable Computation on Outsourced Encrypted Data
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authenticator, such as homomorphic signature with public verifiability and homomorphic MAC with...
Saved in:
Main Authors: | LAI, Junzuo, DENG, Robert H., PANG, Hwee Hwa, Weng, Jian |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2253 https://ink.library.smu.edu.sg/context/sis_research/article/3253/viewcontent/Verifiable_Computation_on_Outsourced_Encrypted_Data__edited_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Attribute-based encryption with verifiable outsourced decryption
by: LAI, Junzuo, et al.
Published: (2013) -
Efficient verifiable computation of linear and quadratic functions over encrypted data
by: TRAN, Ngoc Hieu, et al.
Published: (2016) -
Attribute-based encryption with efficient verifiable outsourced decryption
by: QIN, Baodong, et al.
Published: (2015) -
Attribute-based encryption with efficient verifiable outsourced decryption
by: QIN, Baodong, et al.
Published: (2015) -
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
by: WANG, Yujue, et al.
Published: (2018)