Veriml: Enabling integrity assurances and fair payments for machine learning as a service

L Zhao, Q Wang, C Wang, Q Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Machine Learning as a Service (MLaaS) allows clients with limited resources to outsource
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …

Fine-grained secure computation

M Campanelli, R Gennaro - Theory of Cryptography Conference, 2018 - Springer
This paper initiates a study of Fine Grained Secure Computation: ie the construction of
secure computation primitives against “moderately complex” adversaries. We present …

How to Make Rational Arguments Practical and Extractable

M Campanelli, C Ganesh, R Gennaro - Cryptology ePrint Archive, 2023 - eprint.iacr.org
We investigate proof systems where security holds against rational parties instead of
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …

Outsourcing computation: the minimal refereed mechanism

Y Kong, C Peikert, G Schoenebeck, B Tao - International Conference on …, 2019 - Springer
We consider a setting where a verifier with limited computation power delegates a resource
intensive computation task—which requires a T * S computation tableau—to two provers …

Structural Complexity of Rational Interactive Proofs

D Musatov, G Potapov - Conference on Computability in Europe, 2023 - Springer
Abstract In 2012 PD Azar and S. Micali introduced a new model of interactive proofs, called
“Rational Interactive Proofs”. In this model the prover is neither honest nor malicious, but …

Perfectly secure message transmission against rational adversaries

M Fujita, T Koshiba, K Yasunaga - IEEE Journal on Selected …, 2022 - ieeexplore.ieee.org
Secure Message Transmission (SMT) is a two-party cryptographic protocol by which the
sender can securely and reliably transmit messages to the receiver using multiple channels …

Cryptographic Games

S Rass, S Schauer, S König, Q Zhu, S Rass… - Cyber-Security in Critical …, 2020 - Springer
The term “game” has substantially different meanings within the security area, depending on
whether we speak about cryptographic security in particular, or system security in a more …

Non-cooperative rational interactive proofs

J Chen, S McCauley, S Singh - arXiv preprint arXiv:1708.00521, 2017 - arxiv.org
Interactive-proof games model the scenario where an honest party interacts with powerful
but strategic provers, to elicit from them the correct answer to a computational question …

Perfectly secure message transmission against rational timid adversaries

M Fujita, K Yasunaga, T Koshiba - Decision and Game Theory for Security …, 2018 - Springer
Abstract Secure Message Transmission (SMT) is a two-party cryptographic protocol by
which the sender can securely and reliably transmit messages to the receiver using multiple …

[PDF][PDF] Cryptographic Games

B Schneier - 2020 - academia.edu
The term “game” has substantially different meanings within the security area, depending on
whether we speak about cryptographic security in particular, or system security in a more …