PUBLICATION: Efficient techniques for publicly verifiable delegation of computation
© ACM, 2016. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi'ian, China http://dx.doi.org/10.1145/2897845.2897910