TCC   2005 Theory of Cryptography Conference
Wall of Fame | Most Viewed TCC-2005 Paper
176views Cryptology» more  TCC 2005»
13 years 5 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security deļ¬nition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source176
2Download preprint from source169
3Download preprint from source166
4Download preprint from source163
5Download preprint from source141
6Download preprint from source141
7Download preprint from source139
8Download preprint from source132
9Download preprint from source118
10Download preprint from source116
11Download preprint from source115
12Download preprint from source113
13Download preprint from source108
14Download preprint from source103
15Download preprint from source102
16Download preprint from source102
17Download preprint from source101
18Download preprint from source96
19Download preprint from source95
20Download preprint from source94
21Download preprint from source90
22Download preprint from source88
23Download preprint from source77