Skip to main content
Book cover

Privately and Publicly Verifiable Computing Techniques

A Survey

  • Book
  • © 2017

Overview

  • This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing
  • This survey provides a good overview of the literature and helps people to understand this research field and the state of the art with respect to verifiable computing
  • For all existing approaches we provide a brief description of the approach and highlight the properties the solution achieve. More precisely, we analyse which level of security it provides, how efficient the verification process is, whether anyone or only the client can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to the input and/or output data is given
  • Includes supplementary material: sn.pub/extras

Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (9 chapters)

Keywords

About this book

This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work.

The book is of interest to anyone wanting to understand the state of the art of this research field.

Authors and Affiliations

  • Theoretische Informatik, Technische Universität Darmstadt, Darmstadt, Germany

    Denise Demirel, Lucas Schabhüser, Johannes Buchmann

Bibliographic Information

Publish with us