Articles with "verifiable outsourced" as a keyword



Photo by kellysikkema from unsplash

Comments on “verifiable outsourced attribute-based signature scheme”

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6725-7

Abstract: Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing… read more here.

Keywords: based signature; signature scheme; outsourced attribute; verifiable outsourced ... See more keywords
Photo by chrisliverani from unsplash

Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2018.2861699

Abstract: A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a resource-constrained client to outsource expensive and sensitive workloads to computationally powerful but possibly untrusted service providers (called workers) and to verify the correctness of the results.… read more here.

Keywords: non interactive; outsourced computation; verifiable outsourced; computation ... See more keywords