Sökning: "verifiable computation"

Visar resultat 1 - 5 av 6 avhandlingar innehållade orden verifiable computation.

  1. 1. Cryptographic Tools for Privacy Preservation and Verifiable Randomness

    Författare :Carlo Brunetta; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Confidentiality; Verifiable Randomness; Differential Privacy; GDPR; Privacy; Cryptography;

    Sammanfattning : Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital communication channel used nowadays. Due to the continuous increase of daily communication among people worldwide, more and more data might be stolen, misused or tampered. LÄS MER

  2. 2. Outsourcing Computations to a Cloud That You Don't Trust

    Författare :Georgia Tsaloli; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; differential privacy; function secret sharing; homomorphic secret sharing; verifiable computation; privacy-preservation; public verifiability;

    Sammanfattning : In many application scenarios, data need to be collected, stored and processed. Often sensitive data are collected from IoT devices, which are constrained regarding their resources, and, thus, remote, untrusted cloud servers are required to perform the computations. LÄS MER

  3. 3. Cryptographic Tools for Privacy Preservation

    Författare :Carlo Brunetta; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Outsourced Computation; Verifiability; Cryptography; Privacy; Cloud Computing;

    Sammanfattning : Data permeates every aspect of our daily life and it is the backbone of our digitalized society. Smartphones, smartwatches and many more smart devices measure, collect, modify and share data in what is known as the Internet of Things. LÄS MER

  4. 4. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings

    Författare :Elena Pagnin; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Homomorphic Signatures; Server-Aided Verification; Distance-Bounding Authentication Protocols; Verifiable Com- putation; Biometric Authentication.;

    Sammanfattning : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. LÄS MER

  5. 5. Secure and Privacy-Preserving Cloud-Assisted Computing

    Författare :Georgia Tsaloli; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; differential privacy; decentralization; verifiability; privacy-preservation; secure aggregation; secret sharing; cloud computing; privacy;

    Sammanfattning : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. LÄS MER