{"id":1489,"date":"2017-03-09T09:04:17","date_gmt":"2017-03-09T09:04:17","guid":{"rendered":"https:\/\/service.ait.ac.at\/prismaclone\/?p=1489"},"modified":"2018-09-05T13:52:49","modified_gmt":"2018-09-05T13:52:49","slug":"privately-and-publicly-verifiable-computing-techniques-a-survey","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/privately-and-publicly-verifiable-computing-techniques-a-survey\/","title":{"rendered":"Privately and Publicly Verifiable Computing Techniques: A Survey"},"content":{"rendered":"<p><strong>Authors<\/strong><\/p>\n<p>Johannes Buchmann (TUDA), Denise Demirel (TUDA), Lucas Schabh\u00fcser<\/p>\n<p><strong>Description\u00a0<\/strong><\/p>\n<p>This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing.<br \/>\nThis survey provides a good overview of the literature and helps people to understand this research field and the state of the art with respect to verifiable computing.<br \/>\nFor all existing approaches we provide a brief description of the approach and highlight the properties the solution achieve. More precisely, we analyse which level of security it provides, how efficient the verification process is, whether anyone or only the client can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to the input and\/or output data is given.<\/p>\n<p><strong>Venue<\/strong><\/p>\n<p>Springer Briefs in Computer Science<\/p>\n<p>[<a href=\"https:\/\/prismacloud.eu\/d5-8-overview-of-verifiable-computing-techniques-providing-private-and-public-verification\/\">Download<\/a>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing.<br \/>\nThis survey provides a good overview of the literature and helps people to understand this research field and the state of the art with respect to verifiable computing.<br \/>\nFor all existing approaches we provide a brief description of the approach and highlight the properties the solution achieve. More precisely, we analyse which level of security it provides, how efficient the verification process is, whether anyone or only the client can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to the input and\/or output data is given.<\/p>\n","protected":false},"author":2,"featured_media":1575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1489"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=1489"}],"version-history":[{"count":4,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1489\/revisions"}],"predecessor-version":[{"id":3161,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1489\/revisions\/3161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/1575"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=1489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=1489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=1489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}