<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-17T20:37:41Z</responseDate><request verb="GetRecord" identifier="oai:www.recercat.cat:2117/343725" metadataPrefix="oai_dc">https://recercat.cat/oai/request</request><GetRecord><record><header><identifier>oai:recercat.cat:2117/343725</identifier><datestamp>2026-02-07T12:09:51Z</datestamp><setSpec>com_2072_1033</setSpec><setSpec>col_2072_452950</setSpec></header><metadata><oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
   <dc:title>Efficient polynomial delegation under standard assumptions</dc:title>
   <dc:creator>Morillo Bosch, M. Paz</dc:creator>
   <dc:creator>Obrador Sureda, Marc</dc:creator>
   <dc:contributor>Universitat Politècnica de Catalunya. Departament de Matemàtiques</dc:contributor>
   <dc:contributor>Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia</dc:contributor>
   <dc:subject>Àrees temàtiques de la UPC::Matemàtiques i estadística::Anàlisi matemàtica</dc:subject>
   <dc:subject>Polynomials</dc:subject>
   <dc:subject>Teoria de nombres</dc:subject>
   <dc:subject>Classificació AMS::11 Number theory::11C Polynomials and matrices</dc:subject>
   <dc:description>In this paper we present a new scheme for verifiable delegation of polynomials in a cloud computing scenario. The security of our scheme is based on a standard assumption, the subgroup membership one. Furthermore, the scheme is highly efficient since the number of operations is independent of the degree of the polynomial. We also propose a second scheme that allows to hide the polynomial to be delegated and that improves the efficiency of the scheme by Benabbas et al. in [BGV11]. Moreover, we give a third polynomial delegation scheme which is the first that allows the client to hide the input point.</dc:description>
   <dc:description>Peer Reviewed</dc:description>
   <dc:description>Postprint (author's final draft)</dc:description>
   <dc:date>2013</dc:date>
   <dc:type>Conference lecture</dc:type>
   <dc:identifier>Morillo, M.; Obrador, M. Efficient polynomial delegation under standard assumptions. A: Annual Conference on Privacy, Security and Trust. "2013 Eleventh Annual Conference on Privacy, Security and Trust (PST 2013): Tarragona, Spain: 10-12 july, 2013: proceedings". Institute of Electrical and Electronics Engineers (IEEE), 2013, p. 301-308. ISBN 9781467358378. DOI 10.1109/PST.2013.6596066.</dc:identifier>
   <dc:identifier>9781467358378</dc:identifier>
   <dc:identifier>https://hdl.handle.net/2117/343725</dc:identifier>
   <dc:identifier>10.1109/PST.2013.6596066</dc:identifier>
   <dc:language>eng</dc:language>
   <dc:relation>http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6596066</dc:relation>
   <dc:relation>info:eu-repo/grantAgreement/MICINN//MTM2009-07694/ES/Criptografia De Clave Publica Y Comparticion De Secretos/</dc:relation>
   <dc:rights>Restricted access - publisher's policy</dc:rights>
   <dc:format>8 p.</dc:format>
   <dc:format>application/pdf</dc:format>
   <dc:publisher>Institute of Electrical and Electronics Engineers (IEEE)</dc:publisher>
</oai_dc:dc></metadata></record></GetRecord></OAI-PMH>