Publicly verifiable computing techniques providing long-term privacy

Summary
Proposal for a publicly verifiable computing technique that provides long-term privacy.