메뉴 건너뛰기




Volumn , Issue , 2007, Pages 440-449

Verifying and decoding in constant depth

Author keywords

Constant depth circuits; Error correcting codes; Interactive proofs

Indexed keywords

CONSTANT-DEPTH CIRCUITS; ERROR-CORRECTING CODES; INTERACTIVE PROOFS; PROGRAM CHECKING;

EID: 35448999667     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250790.1250855     Document Type: Conference Paper
Times cited : (42)

References (26)
  • 1
    • 0042419955 scopus 로고
    • Approximate counting with uniform constant-depth circuits
    • Amererican Mathematical Society
    • M. Ajtai. Approximate counting with uniform constant-depth circuits. In Advances in computational complexity theory, pages 1-20. Amererican Mathematical Society, 1993.
    • (1993) Advances in computational complexity theory , pp. 1-20
    • Ajtai, M.1
  • 6
    • 0001338853 scopus 로고
    • BPP ha,s subexponential simulation unless Exptime has publishable proofs
    • L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP ha,s subexponential simulation unless Exptime has publishable proofs. Computational Complexity, 3:307-318, 1993.
    • (1993) Computational Complexity , vol.3 , pp. 307-318
    • Babai, L.1    Fortnow, L.2    Nisan, N.3    Wigderson, A.4
  • 7
    • 0023995534 scopus 로고
    • Arthur-merlin games: A randomized proof system, and a hierarchy of complexity classes
    • L. Babai and S. Moran. Arthur-merlin games: A randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36:254-276, 1988.
    • (1988) Journal of Computer and System Sciences , vol.36 , pp. 254-276
    • Babai, L.1    Moran, S.2
  • 9
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • M. Blum and S. Kannan. Designing programs that check their work. Journal of the ACM, 42(1):269-291, 1995.
    • (1995) Journal of the ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 10
    • 0000619172 scopus 로고
    • Self-testing/correcting with applications to numerical problems
    • M. Blum, M. Luby, and R. Rubinfeld. Self-testing/correcting with applications to numerical problems. Journal of Computer and System Sciences, 47(3):549-595, 1993.
    • (1993) Journal of Computer and System Sciences , vol.47 , Issue.3 , pp. 549-595
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 13
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems. Journal of the ACM, 38(1):691-729, 1991.
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 35448959915 scopus 로고    scopus 로고
    • Designing efficient program checkers by delegating their work
    • Manuscript
    • S. Goldwasser, D. Gutfreund, A. Healy, T. Kaufman, and G. Rothblum. Designing efficient program checkers by delegating their work. Manuscript, 2006.
    • (2006)
    • Goldwasser, S.1    Gutfreund, D.2    Healy, A.3    Kaufman, T.4    Rothblum, G.5
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. SIAM Journal on Computing, 18(1):186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 0001796243 scopus 로고
    • Private coins versus public coins in interactive proof systems
    • of
    • S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems, volume 5 of Advances in Computing Research, pages 73-90, 1989.
    • (1989) Advances in Computing Research , vol.5 , pp. 73-90
    • Goldwasser, S.1    Sipser, M.2
  • 19
    • 84869164571 scopus 로고    scopus 로고
    • Perfect constant-round secure computation via perfect randomizing polynomials
    • Y. Ishai and E. Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In In proceedins of 29th ICALP, pages 244-256, 2002.
    • (2002) In proceedins of 29th ICALP , pp. 244-256
    • Ishai, Y.1    Kushilevitz, E.2
  • 22
    • 35448930221 scopus 로고    scopus 로고
    • A. Shamir. IP = PSPACE. In Proceedings of the 31st Annual IEEE Symposium on Foundations of Computer Science, pages 11-15, 1990.
    • A. Shamir. IP = PSPACE. In Proceedings of the 31st Annual IEEE Symposium on Foundations of Computer Science, pages 11-15, 1990.
  • 24
    • 33748588052 scopus 로고    scopus 로고
    • Some applications of coding theory in computational complexity
    • L. Trevisan. Some applications of coding theory in computational complexity. Quaderni di Matematica, 13:347-424, 2004.
    • (2004) Quaderni di Matematica , vol.13 , pp. 347-424
    • Trevisan, L.1
  • 26
    • 35448936371 scopus 로고    scopus 로고
    • Personal communication
    • S. Vadhan. Personal communication, 2006.
    • (2006)
    • Vadhan, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.