Verifiable outsourced computation over encrypted data

•An end-to-end system enables the public to verify outsourced computations.•Perform computations in ciphertexts in order to preserve data confidentiality.•Preserve the privacy of data providers against public verifiers.•Verification overhead depends on the number of variables in computation. In rece...

Full description

Saved in:
Bibliographic Details
Published in:Information sciences Vol. 479; pp. 372 - 385
Main Authors: Yu, Xixun, Yan, Zheng, Zhang, Rui
Format: Journal Article
Language:English
Published: Elsevier Inc 01.04.2019
Subjects:
ISSN:0020-0255, 1872-6291
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first