CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model
The multi-tenant coexistence service mode makes the cloud-based scientific workflow
encounter the risks of being intruded. For this problem, we propose a CLoud scientific …
encounter the risks of being intruded. For this problem, we propose a CLoud scientific …
Rational proofs with multiple provers
Interactive proofs model a world where a verifier delegates computation to an untrustworthy
prover, verifying the prover's claims before accepting them. These proofs have applications …
prover, verifying the prover's claims before accepting them. These proofs have applications …
Fine-grained secure computation
M Campanelli, R Gennaro - Theory of Cryptography Conference, 2018 - Springer
This paper initiates a study of Fine Grained Secure Computation: ie the construction of
secure computation primitives against “moderately complex” adversaries. We present …
secure computation primitives against “moderately complex” adversaries. We present …
How to Make Rational Arguments Practical and Extractable
We investigate proof systems where security holds against rational parties instead of
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …
Rational proofs against rational verifiers
K Inasawa, K Yasunaga - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive
proofs in which the prover is rational, and may deviate from the protocol for increasing his …
proofs in which the prover is rational, and may deviate from the protocol for increasing his …
Efficient rational proofs for space bounded computations
M Campanelli, R Gennaro - Decision and Game Theory for Security: 8th …, 2017 - Springer
We present new protocols for the verification of space bounded polytime computations
against a rational adversary. For such computations requiring sublinear space our protocol …
against a rational adversary. For such computations requiring sublinear space our protocol …
Fair and rational delegation computation protocol
尹鑫, 田有亮, 王海龙 - Journal of Software, 2017 - jos.org.cn
传统委托计算的验证过程计算和通信开销较高, 且参与者要么诚实, 要么邪恶;
理性委托计算是引入理性参与者, 通过效用函数来保障计算结果的可靠性 …
理性委托计算是引入理性参与者, 通过效用函数来保障计算结果的可靠性 …
Outsourcing computation: the minimal refereed mechanism
We consider a setting where a verifier with limited computation power delegates a resource
intensive computation task—which requires a T * S computation tableau—to two provers …
intensive computation task—which requires a T * S computation tableau—to two provers …
[PDF][PDF] 公平理性委托计算协议
尹鑫, 田有亮, 王海龙 - 软件学报, 2017 - jos.org.cn
传统委托计算的验证过程计算和通信开销较高, 且参与者要么诚实, 要么邪恶;
理性委托计算是引入理性参与者, 通过效用函数来保障计算结果的可靠性 …
理性委托计算是引入理性参与者, 通过效用函数来保障计算结果的可靠性 …
Efficient rational proofs with strong utility-gap guarantees
As modern computing moves towards smaller devices and powerful cloud platforms, more
and more computation is being delegated to powerful service providers. Interactive proofs …
and more computation is being delegated to powerful service providers. Interactive proofs …