Conjuction 发表于 2025-3-30 08:20:51
Beatrice Sandberge-constrained (mobile) devices and advancements in cloud computing, delegation of such . computations to powerful server providers has gained lots of attention. In this paper, we address the problem of verifiably secure delegation of .s using two servers, where at most one of which is assumed to be