International audienceWe consider the setting in which an untrusted server stores a collection of data and is asked to compute a function over it. In this scenario, we aim for solutions where the untrusted server does not learn information about the data and is prevented from cheating. This problem is addressed by verifiable and private delegation of computation, proposed by Gennaro, Gentry and Parno (CRYPTO'10), a notion that is close to both the active areas of homomorphic encryption and verifiable computation (VC). However, in spite of the efficiency advances in the respective areas, VC protocols that guarantee privacy of the inputs are still expensive. The only exception is a protocol by Fiore, Gennaro and Pastro (CCS'14) that supports ...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
We consider the problem of verifiable and private delegation of computation [Gennaro et al. CRYPTO\u...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Abstract. We study the task of efficient verifiable delegation of computation on encrypted data. Fir...
Fully Homomorphic Encryption (FHE) is a prevalent cryptographic primitive that allows for computatio...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is ...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
International audienceWe address the question of how a computationally limited device may outsource ...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
We consider the problem of verifiable and private delegation of computation [Gennaro et al. CRYPTO\u...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Abstract. We study the task of efficient verifiable delegation of computation on encrypted data. Fir...
Fully Homomorphic Encryption (FHE) is a prevalent cryptographic primitive that allows for computatio...
In many application scenarios, data need to be collected, stored and processed. Often sensitive data...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
In this work we propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
We demonstrate that by using a recently proposed somewhat homomorphic encryption (SHE) scheme it is ...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
International audienceWe address the question of how a computationally limited device may outsource ...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...