Author:
Chakraborty Partha Sarathi,Gavhane Omkar Santosh,Tripathy Somanath
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference23 articles.
1. Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 863–874 (2013)
2. Bois, A., Cascudo, I., Fiore, D., Kim, D.: Flexible and efficient verifiable computation on encrypted data. Public-Key Cryptogr PKC 2021, 528–558 (2021)
3. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS ’12, pp. 309–325, New York, NY, USA. Association for Computing Machinery (2012)
4. Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65(10), 3184–3195 (2016)
5. Fiore, D., Nitulescu, A., Pointcheval, D.: Boosting verifiable computation on encrypted data. In: Public-Key Cryptography—PKC 2020, pp. 124–154. Springer, Cham (2020)