FOCS '03 Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science
A Distributed Implementation of the Certified Information Access Service
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Distributed certified information access for mobile devices
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A web computing environment for parallel algorithms in java
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
Load balancing strategies in a web computing environment
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
Updatable zero-knowledge databases
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Mercurial commitments with applications to zero-knowledge sets
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Mercurial commitments: minimal assumptions and efficient constructions
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A Distributed Implementation of the Certified Information Access Service
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Journal of Systems and Software
Hi-index | 0.00 |
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures used by current implementations of the Certified Information Accessprimitive. To this aim, we introduce the concept of a Verifiable Deterministic Envelope- that may be of independent interest - and we provide practical implementations, based on standard cryptographic assumptions.We also discuss a prototype implementation of our proposal based on the PUB-WCL framework developed at the University of Paderborn for sharing computation across a network.