Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive

J Weng, J Weng, J Zhang, M Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Deep learning can achieve higher accuracy than traditional machine learning algorithms in
a variety of machine learning tasks. Recently, privacy-preserving deep learning has drawn …

Blockchain-based solutions for cloud computing: A survey

MR Dorsala, VN Sastry, S Chapram - Journal of Network and Computer …, 2021 - Elsevier
Blockchain is a disruptive technology applied by academia and industry in a broad spectrum
of applications ranging from cryptocurrency, financial services, IoT, 5G, risk management to …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

Security and privacy for storage and computation in cloud computing

L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen… - Information …, 2014 - Elsevier
Cloud computing emerges as a new computing paradigm that aims to provide reliable,
customized and quality of service guaranteed computation environments for cloud users …

How to use bitcoin to design fair protocols

I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …

Verifiable delegation of computation over large datasets

S Benabbas, R Gennaro, Y Vahlis - Annual Cryptology Conference, 2011 - Springer
We study the problem of computing on large datasets that are stored on an untrusted server.
We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry …

Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing

C Dong, Y Wang, A Aldweesh, P McCorry… - Proceedings of the …, 2017 - dl.acm.org
Cloud computing has become an irreversible trend. Together comes the pressing need for
verifiability, to assure the client the correctness of computation outsourced to the cloud …

How to use bitcoin to incentivize correct computations

R Kumaresan, I Bentov - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
We study a model of incentivizing correct computations in a variety of cryptographic tasks.
For each of these tasks we propose a formal model and design protocols satisfying our …

Publicly verifiable delegation of large polynomials and matrix computations, with applications

D Fiore, R Gennaro - Proceedings of the 2012 ACM conference on …, 2012 - dl.acm.org
Outsourced computations (where a client requests a server to perform some computation on
its behalf) are becoming increasingly important due to the rise of Cloud Computing and the …

Veriml: Enabling integrity assurances and fair payments for machine learning as a service

L Zhao, Q Wang, C Wang, Q Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Machine Learning as a Service (MLaaS) allows clients with limited resources to outsource
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …