2017
DOI: 10.1007/978-3-319-53798-6
|View full text |Cite
|
Sign up to set email alerts
|

Privately and Publicly Verifiable Computing Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…While for practical outsourced applications, no or very few specific schemes were referred to in the surveys [17]- [20]. Scheme [21] and [22] mainly introduced verifiable computing techniques and some related practical designs. In [23] and [24], secure outsourcing schemes for a limited number of functions (e.g., scientific computations) were discussed, and these surveys consider different techniques including HE algorithms.…”
Section: Comparison With Other Surveysmentioning
confidence: 99%
“…While for practical outsourced applications, no or very few specific schemes were referred to in the surveys [17]- [20]. Scheme [21] and [22] mainly introduced verifiable computing techniques and some related practical designs. In [23] and [24], secure outsourcing schemes for a limited number of functions (e.g., scientific computations) were discussed, and these surveys consider different techniques including HE algorithms.…”
Section: Comparison With Other Surveysmentioning
confidence: 99%