Smart meter data privacy: A survey

MR Asghar, G Dán, D Miorandi… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Automated and smart meters are devices that are able to monitor the energy consumption of
electricity consumers in near real-time. They are considered key technological enablers of …

A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Transparent polynomial delegation and its applications to zero knowledge proof

J Zhang, T **e, Y Zhang, D Song - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present a new succinct zero knowledge argument scheme for layered arithmetic circuits
without trusted setup. The prover time is O (C+ nlogn) and the proof size is O (D logC+ log 2 …

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data

Q Zheng, S Xu, G Ateniese - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …

From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again

N Bitansky, R Canetti, A Chiesa, E Tromer - Proceedings of the 3rd …, 2012 - dl.acm.org
The existence of succinct non-interactive arguments for NP (ie, non-interactive
computationally-sound proofs where the verifier's work is essentially independent of the …

vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases

Y Zhang, D Genkin, J Katz… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Cloud database systems such as Amazon RDS or Google Cloud SQLenable the
outsourcing of a large database to a server who then responds to SQL queries. A natural …

Succinct non-interactive arguments via linear interactive proofs

N Bitansky, A Chiesa, Y Ishai, R Ostrovsky… - Journal of …, 2022 - Springer
Succinct non-interactive arguments (SNARGs) enable verifying NP statements with lower
complexity than required for classical NP verification. Traditionally, the focus has been on …

Delegatable pseudorandom functions and applications

A Kiayias, S Papadopoulos, N Triandopoulos… - Proceedings of the …, 2013 - dl.acm.org
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …

Verifiable fully homomorphic encryption

A Viand, C Knabenhans, A Hithnawi - arxiv preprint arxiv:2301.07041, 2023 - arxiv.org
Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect
data in use by allowing computation over encrypted data. However, the same malleability …

Vector commitments and their applications

D Catalano, D Fiore - Public-Key Cryptography–PKC 2013: 16th …, 2013 - Springer
We put forward the study of a new primitive that we call Vector Commitment (VC, for short).
Informally, VCs allow to commit to an ordered sequence of q values (m1,..., mq) in such a …