Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
17
views
24
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,153
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptography – PKC 2014
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing
other
Author(s):
Prabhanjan Ananth
,
Nishanth Chandran
,
Vipul Goyal
,
Bhavana Kanukurthi
,
Rafail Ostrovsky
Publication date
(Print):
2014
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Radiology and Natural Language Processing
Most cited references
24
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Protocols for secure computations
Andrew Yao
(1982)
0
comments
Cited
100
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Divertible protocols and atomic proxy cryptography
Matt Blaze
,
Gerrit Bleumer
,
Martin Strauss
(1998)
0
comments
Cited
86
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Proof of Security of Yao’s Protocol for Two-Party Computation
Benny Pinkas
,
Yehuda Lindell
(2009)
0
comments
Cited
73
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 149-166
DOI:
10.1007/978-3-642-54631-0_9
SO-VID:
441e160d-9a7b-4453-b713-8bf9aa9973eb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 149
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing
pp. 185
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
pp. 293
Online/Offline Attribute-Based Encryption
pp. 311
Scale-Invariant Fully Homomorphic Encryption over the Integers
pp. 345
Lattice-Based Group Signature Scheme with Verifier-Local Revocation
pp. 429
Lazy Modulus Switching for the BKW Algorithm on LWE
pp. 501
Functional Signatures and Pseudorandom Functions
pp. 520
Policy-Based Signatures
Similar content
3,153
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE)
Authors:
S DEVADAS
,
M VAN DIJK
,
C.W. Fletcher
…
Amplification and overexpression of HER-2/neu in carcinomas of fhe salivary gland: correlation with poor prognosis
Authors:
M Press
,
M Pike
,
J Hung
…
Two round multiparty computation via multi-key FHE
Authors:
P. MUKHERJEE
,
D Wichs
See all similar
Cited by
3
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
Authors:
Berry Schoenmakers
,
Meilof Veeningen
,
Niels de Vreede
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing
Authors:
Prabhanjan Ananth
,
Nishanth Chandran
,
Vipul Goyal
…
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
Authors:
Binrui Zhu
,
Jixin Ma
,
Jiankun Hu
…
See all cited by