2011
DOI: 10.1007/978-3-642-22792-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Memory Delegation

Abstract: Abstract. We consider the problem of delegating computation, where the delegator doesn't even know the input to the function being delegated, and runs in time significantly smaller than the input length.For example, consider the setting of memory delegation, where a delegator wishes to delegate her entire memory to the cloud. The delegator may want the cloud to compute functions on this memory, and prove that the functions were computed correctly. As another example, consider the setting of streaming delegatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
68
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 90 publications
(68 citation statements)
references
References 25 publications
0
68
0
Order By: Relevance
“…[16,33,34,55]) have used fully homomorphic encryption, which unfortunately remains impractical despite substantial recent progress. Work in this category by Chung et al [33] focuses on streaming settings, and is therefore particularly relevant to our work in this thesis.…”
Section: Related Workmentioning
confidence: 99%
“…[16,33,34,55]) have used fully homomorphic encryption, which unfortunately remains impractical despite substantial recent progress. Work in this category by Chung et al [33] focuses on streaming settings, and is therefore particularly relevant to our work in this thesis.…”
Section: Related Workmentioning
confidence: 99%
“…The research community has introduced streaming verifiable computation, both in the statistical [11,12] and the cryptographic setting [10,42], where a verifier and a prover observe a stream of n elements x 1 , x 2 , . . .…”
Section: Related Workmentioning
confidence: 99%
“…Thus they support one-shot computation tasks, whereas we allow any number of queries. Although most of the existing streaming verifiable protocols [10,11,12] are particularly efficient in terms of verifier complexity (e.g., (poly-)logarithmic in the size of the stream), the main shortcoming of all previous work (except for the work of Schröder and Schröder [42], see next paragraph) is the fact that the prover complexity is linear in the size of the stream, even for sublinear (logarithmic) computations, e.g., membership and range search queries on a stream of elements drawn from an ordered universe. 2 This significantly limits the applicability of these protocols since such an overhead introduces a large amount of latency, making them impractical for real-world deployment.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations