Abstract | ||
---|---|---|
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures used by current implementations of the Certified Information Accessprimitive. To this aim, we introduce the concept of a Verifiable Deterministic Envelope- that may be of independent interest - and we provide practical implementations, based on standard cryptographic assumptions.We also discuss a prototype implementation of our proposal based on the PUB-WCL framework developed at the University of Paderborn for sharing computation across a network. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-88313-5_26 | ESORICS |
Keywords | Field | DocType |
certified information accessprimitive,outsourcing computation,pub-wcl framework,private data,independent interest,certified information access service,practical implementation,prototype implementation,verifiable deterministic envelope,data structure,current implementation | Data structure,Computer security,Cryptography,Computer science,Information access,Commitment scheme,Implementation,Verifiable secret sharing,Certification,Computation,Distributed computing | Conference |
Volume | ISSN | Citations |
5283 | 0302-9743 | 2 |
PageRank | References | Authors |
0.40 | 12 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Carlo Blundo | 1 | 1901 | 229.50 |
Emiliano De Cristofaro | 2 | 1161 | 77.02 |
Aniello Del Sorbo | 3 | 112 | 6.92 |
Clemente Galdi | 4 | 150 | 22.16 |
Giuseppe Persiano | 5 | 1773 | 152.14 |