Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2018
/
Article
/
Tab 4
/
Research Article
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
Table 4
Comparison of the three PVC schemes for matrix vector multiplication.
ā
FG12 [
2
]
EOA16 [
19
]
Ours
KeyGen
ProbGen
Compute
ā
PubVer
PrivRet
Result confidentiality
No
No
Yes
Input Privacy
No
No
Partial