Veriml: Enabling integrity assurances and fair payments for machine learning as a service
Machine Learning as a Service (MLaaS) allows clients with limited resources to outsource
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …
their expensive ML tasks to powerful servers. Despite the huge benefits, current MLaaS …
Fine-grained secure computation
M Campanelli, R Gennaro - Theory of Cryptography Conference, 2018 - Springer
This paper initiates a study of Fine Grained Secure Computation: ie the construction of
secure computation primitives against “moderately complex” adversaries. We present …
secure computation primitives against “moderately complex” adversaries. We present …
How to Make Rational Arguments Practical and Extractable
We investigate proof systems where security holds against rational parties instead of
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …
Outsourcing computation: the minimal refereed mechanism
We consider a setting where a verifier with limited computation power delegates a resource
intensive computation task—which requires a T * S computation tableau—to two provers …
intensive computation task—which requires a T * S computation tableau—to two provers …
Structural Complexity of Rational Interactive Proofs
D Musatov, G Potapov - Conference on Computability in Europe, 2023 - Springer
Abstract In 2012 PD Azar and S. Micali introduced a new model of interactive proofs, called
“Rational Interactive Proofs”. In this model the prover is neither honest nor malicious, but …
“Rational Interactive Proofs”. In this model the prover is neither honest nor malicious, but …
Perfectly secure message transmission against rational adversaries
M Fujita, T Koshiba, K Yasunaga - IEEE Journal on Selected …, 2022 - ieeexplore.ieee.org
Secure Message Transmission (SMT) is a two-party cryptographic protocol by which the
sender can securely and reliably transmit messages to the receiver using multiple channels …
sender can securely and reliably transmit messages to the receiver using multiple channels …
Cryptographic Games
The term “game” has substantially different meanings within the security area, depending on
whether we speak about cryptographic security in particular, or system security in a more …
whether we speak about cryptographic security in particular, or system security in a more …
Non-cooperative rational interactive proofs
Interactive-proof games model the scenario where an honest party interacts with powerful
but strategic provers, to elicit from them the correct answer to a computational question …
but strategic provers, to elicit from them the correct answer to a computational question …
Perfectly secure message transmission against rational timid adversaries
M Fujita, K Yasunaga, T Koshiba - Decision and Game Theory for Security …, 2018 - Springer
Abstract Secure Message Transmission (SMT) is a two-party cryptographic protocol by
which the sender can securely and reliably transmit messages to the receiver using multiple …
which the sender can securely and reliably transmit messages to the receiver using multiple …
[PDF][PDF] Cryptographic Games
B Schneier - 2020 - academia.edu
The term “game” has substantially different meanings within the security area, depending on
whether we speak about cryptographic security in particular, or system security in a more …
whether we speak about cryptographic security in particular, or system security in a more …