Memory delegation

    CRYPTO, pp. 151-165, 2011.

    Cited by: 123|Bibtex|Views7|Links
    EI
    Keywords:
    input lengthhomomorphic encryption schemepolylog PIR schemelow depthpresent constructionMore(5+)

    Abstract:

    We consider the problem of delegating computation, where the delegator doesn't even know the input to the function being delegated, and runs in time significantly smaller than the input length. For example, consider the setting of memory delegation, where a delegator wishes to delegate her entire memory to the cloud. The delegator may wan...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments