CRYPTO, pp. 151-165, 2011.
input lengthhomomorphic encryption schemepolylog PIR schemelow depthpresent constructionMore(5+)
We consider the problem of delegating computation, where the delegator doesn't even know the input to the function being delegated, and runs in time significantly smaller than the input length. For example, consider the setting of memory delegation, where a delegator wishes to delegate her entire memory to the cloud. The delegator may wan...More