-
2
-
-
33745306666
-
Computationally private randomizing polynomials and their applications
-
DOI 10.1007/s00037-006-0211-8
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. Computationally private randomizing polynomials and their applications. Computational Complexity, 15(2):115-162, 2006. (Pubitemid 43938398)
-
(2006)
Computational Complexity
, vol.15
, Issue.2
, pp. 115-162
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
4
-
-
0002771903
-
Non-deterministic exponential time has two-prover interactive protocols
-
L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover interactive protocols. Computational complexity, 1(1):3-40, 1991.
-
(1991)
Computational Complexity
, vol.1
, Issue.1
, pp. 3-40
-
-
Babai, L.1
Fortnow, L.2
Lund, C.3
-
5
-
-
0023995534
-
ARTHUR-MERLIN GAMES: A RANDOMIZED PROOF SYSTEM, AND A HIERARCHY OF COMPLEXITY CLASSES
-
DOI 10.1016/0022-0000(88)90028-1
-
L. Babai and S. Moran. Arthur-merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36(2):254-276, 1988. (Pubitemid 18623335)
-
(1988)
Journal of Computer and System Sciences
, vol.36
, Issue.2
, pp. 254-276
-
-
Babai, L.1
-
6
-
-
84862602442
-
Only valuable experts can be valued
-
ACM
-
M. Babaioff, L. Blumrosen, N.S. Lambert, and O. Reingold. Only valuable experts can be valued. In Proceedings of the 12th ACM conference on Electronic commerce, pages 221-222. ACM, 2011.
-
(2011)
Proceedings of the 12th ACM Conference on Electronic Commerce
, pp. 221-222
-
-
Babaioff, M.1
Blumrosen, L.2
Lambert, N.S.3
Reingold, O.4
-
7
-
-
0036294828
-
Universal arguments and their applications
-
B. Barak and O. Goldreich. Universal arguments and their applications. ccc, page 0194, 2002.
-
(2002)
Ccc
, pp. 0194
-
-
Barak, B.1
Goldreich, O.2
-
8
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
ACM
-
M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. In Proceedings of the twentieth annual ACM symposium on Theory of computing, pages 113-131. ACM, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
10
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. 3rd Innovations in Theoretial Computer Science, 2012.
-
(2012)
3rd Innovations in Theoretial Computer Science
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
12
-
-
0003010182
-
Verification of forecasts expressed in terms of probability
-
G.W. Brier. Verification of forecasts expressed in terms of probability. Monthly weather review, 1950.
-
(1950)
Monthly Weather Review
-
-
Brier, G.W.1
-
14
-
-
78149359256
-
Gaming prediction markets: Equilibrium strategies with a market maker
-
Y. Chen, S. Dimitrov, R. Sami, D.M. Reeves, D.M. Pennock, R.D. Hanson, L. Fortnow, and R. Gonen. Gaming prediction markets: Equilibrium strategies with a market maker. Algorithmica, 58(4):930-969, 2009.
-
(2009)
Algorithmica
, vol.58
, Issue.4
, pp. 930-969
-
-
Chen, Y.1
Dimitrov, S.2
Sami, R.3
Reeves, D.M.4
Pennock, D.M.5
Hanson, R.D.6
Fortnow, L.7
Gonen, R.8
-
15
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
K.M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. Advances in Cryptology-CRYPTO 2010, pages 483-501, 2010.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 483-501
-
-
Chung, K.M.1
Kalai, Y.2
Vadhan, S.3
-
17
-
-
84856489354
-
Secure two-party computation with low communication
-
ePrint Archive, Report 2011/508
-
Ivan Damgård, Sebastian Faust, and Carmit Hazay. Secure two-party computation with low communication. Cryptology ePrint Archive, Report 2011/508, 2011.
-
(2011)
Cryptology
-
-
Damgård, I.1
Faust, S.2
Hazay, C.3
-
19
-
-
0028544648
-
On the power of multi-prover interactive protocols
-
L. Fortnow, J. Rompel, and M. Sipser. On the power of multi-prover interactive protocols. Theoretical Computer Science, 134(2):545-557, 1994.
-
(1994)
Theoretical Computer Science
, vol.134
, Issue.2
, pp. 545-557
-
-
Fortnow, L.1
Rompel, J.2
Sipser, M.3
-
20
-
-
57649186577
-
The complexity of forecast testing
-
L. Fortnow and R.V. Vohra. The complexity of forecast testing. Econometrica, 77(1):93-105, 2009.
-
(2009)
Econometrica
, vol.77
, Issue.1
, pp. 93-105
-
-
Fortnow, L.1
Vohra, R.V.2
-
21
-
-
0024057387
-
Are there interactive protocols for co-np languages?
-
Lance Fortnow and Michael Sipser. Are there interactive protocols for co-np languages? Information Processing Letters, 28:249-251, 1988.
-
(1988)
Information Processing Letters
, vol.28
, pp. 249-251
-
-
Fortnow, L.1
Sipser, M.2
-
22
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Advances in Cryptology-CRYPTO 2010, pages 465-482, 2010.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
23
-
-
33947274775
-
Strictly proper scoring rules, prediction, and estimation
-
T. Gneiting and A.E. Raftery. Strictly proper scoring rules, prediction, and estimation. Journal of the American Statistical Association, 102(477):359-378, 2007.
-
(2007)
Journal of the American Statistical Association
, vol.102
, Issue.477
, pp. 359-378
-
-
Gneiting, T.1
Raftery, A.E.2
-
24
-
-
84862628873
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
IEEE
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Foundations of Computer Science, 1986., 27th Annual Symposium on, pages 174-187. IEEE, 1988.
-
(1988)
Foundations of Computer Science, 1986., 27th Annual Symposium on
, pp. 174-187
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
32
-
-
40249118370
-
Bridging game theory and cryptography: Recent results and future directions
-
J. Katz. Bridging game theory and cryptography: Recent results and future directions. Theory of Cryptography, pages 251-272, 2008.
-
(2008)
Theory of Cryptography
, pp. 251-272
-
-
Katz, J.1
-
34
-
-
0026930922
-
Algebraic methods for interactive proof systems
-
DOI 10.1145/146585.146605
-
C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic methods for interactive proof systems. Journal of the ACM (JACM), 39(4):859-868, 1992. (Pubitemid 23600385)
-
(1992)
Journal of the ACM
, vol.39
, Issue.4
, pp. 859-868
-
-
Lund, C.1
Fortnow, L.2
Karloff, H.3
Nisan, N.4
-
35
-
-
0034854953
-
Computationally sound proofs
-
DOI 10.1137/S0097539795284959, PII S0097539795284959
-
S. Micali. Computationally sound proofs. SIAM Journal on Computing, 30(4):1253-1298, 2001. (Pubitemid 32837894)
-
(2001)
SIAM Journal on Computing
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
37
-
-
0346991618
-
The reproducible properties of correct forecasts
-
DOI 10.1007/s001820300153
-
A. Sandroni. The reproducible properties of correct forecasts. International Journal of Game Theory, 32(1):151-159, 2003. (Pubitemid 37550825)
-
(2003)
International Journal of Game Theory
, vol.32
, Issue.1
, pp. 151-159
-
-
Sandroni, A.1
-
38
-
-
84856451713
-
Delegation of computation without rejection problem from designated verifier cs-proofs
-
ePrint Archive, Report 2011/456
-
Aviad Rubinstein Shaff Goldwasser, Huijia Lin. Delegation of computation without rejection problem from designated verifier cs-proofs. Cryptology ePrint Archive, Report 2011/456, 2011.
-
(2011)
Cryptology
-
-
Rubinstein, A.1
Goldwasser, S.2
Lin, H.3
-
40
-
-
25444462746
-
Non-cooperative computation: Boolean functions with correctness and exclusivity
-
DOI 10.1016/j.tcs.2005.05.009, PII S0304397505003117, Game Theory Meets Theoretical Computer Science
-
Y. Shoham and M. Tennenholtz. Non-cooperative computation: Boolean functions with correctness and exclusivity. Theoretical Computer Science, 343(1-2):97-113, 2005. (Pubitemid 41360147)
-
(2005)
Theoretical Computer Science
, vol.343
, Issue.1-2
, pp. 97-113
-
-
Shoham, Y.1
Tennenholtz, M.2
-
41
-
-
0026239342
-
Pp is as hard as the polynomial-time hierarchy
-
S. Toda. Pp is as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 20:865, 1991.
-
(1991)
SIAM Journal on Computing
, vol.20
, pp. 865
-
-
Toda, S.1
-
42
-
-
0000027812
-
Complexity classes defined by counting quantifiers
-
J. Torán. Complexity classes defined by counting quantifiers. Journal of the ACM (JACM), 38(3):752-773, 1991.
-
(1991)
Journal of the ACM (JACM)
, vol.38
, Issue.3
, pp. 752-773
-
-
Torán, J.1
-
43
-
-
0022733806
-
The complexity of combinatorial problems with succinct input representation
-
K.W. Wagner. The complexity of combinatorial problems with succinct input representation. Acta Informatica, 23(3):325-356, 1986.
-
(1986)
Acta Informatica
, vol.23
, Issue.3
, pp. 325-356
-
-
Wagner, K.W.1
|