Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive
Deep learning can achieve higher accuracy than traditional machine learning algorithms in
a variety of machine learning tasks. Recently, privacy-preserving deep learning has drawn …
a variety of machine learning tasks. Recently, privacy-preserving deep learning has drawn …
Blockchain-based solutions for cloud computing: A survey
Blockchain is a disruptive technology applied by academia and industry in a broad spectrum
of applications ranging from cryptocurrency, financial services, IoT, 5G, risk management to …
of applications ranging from cryptocurrency, financial services, IoT, 5G, risk management to …
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …
computationally weak client to “outsource” the computation of a function F on various …
Security and privacy for storage and computation in cloud computing
Cloud computing emerges as a new computing paradigm that aims to provide reliable,
customized and quality of service guaranteed computation environments for cloud users …
customized and quality of service guaranteed computation environments for cloud users …
How to use bitcoin to design fair protocols
I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …
Verifiable delegation of computation over large datasets
We study the problem of computing on large datasets that are stored on an untrusted server.
We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry …
We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry …
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
Cloud computing has become an irreversible trend. Together comes the pressing need for
verifiability, to assure the client the correctness of computation outsourced to the cloud …
verifiability, to assure the client the correctness of computation outsourced to the cloud …
How to use bitcoin to incentivize correct computations
R Kumaresan, I Bentov - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
We study a model of incentivizing correct computations in a variety of cryptographic tasks.
For each of these tasks we propose a formal model and design protocols satisfying our …
For each of these tasks we propose a formal model and design protocols satisfying our …
Publicly verifiable delegation of large polynomials and matrix computations, with applications
Outsourced computations (where a client requests a server to perform some computation on
its behalf) are becoming increasingly important due to the rise of Cloud Computing and the …
its behalf) are becoming increasingly important due to the rise of Cloud Computing and the …
Veriml: Enabling integrity assurances and fair payments for machine learning as a service
Machine Learning as a Service (MLaaS) allows clients with limited resources to outsource
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …