Secure Client- Server Delegated Computation: Difference between revisions

Jump to navigation Jump to search
Line 22: Line 22:
== Property/Security Definitions ==
== Property/Security Definitions ==
Following are the definitions of various properties and security realized by the different DQC protocols mentioned above.
Following are the definitions of various properties and security realized by the different DQC protocols mentioned above.
===Adversarial Assumption===
* ''Secure against Honest But Curious adversary protocols are non-verifiable protocols.'' In this setting, protocols assumes a dishonest server only tries to learn Client’s hidden variables (input, output or computation) and not mutate it.
* ''Secure against Malicious adversary protocol are verifiable protocols.'' In this setting, a dishonest server apart from trying to learn the Client’s hidden variable may also try to change it.
===Properties===
===Properties===
* ''Blindness'' asserts the Client’s input/output/server are blind (unknown) to the Server.
* ''Blindness'' asserts the Client’s input/output/server are blind (unknown) to the Server.
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu