메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1017-1028

Rational proofs

Author keywords

counting hierarchy; interactive proofs; rational cryptography

Indexed keywords

CLASSICAL COUNTERPART; COUNTING HIERARCHY; INTERACTIVE PROOFS; POLYNOMIAL-TIME VERIFIERS; PROOF SYSTEM; PROPER SCORING RULES;

EID: 84862599114     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2213977.2214069     Document Type: Conference Paper
Times cited : (38)

References (43)
  • 2
    • 33745306666 scopus 로고    scopus 로고
    • Computationally private randomizing polynomials and their applications
    • DOI 10.1007/s00037-006-0211-8
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. Computationally private randomizing polynomials and their applications. Computational Complexity, 15(2):115-162, 2006. (Pubitemid 43938398)
    • (2006) Computational Complexity , vol.15 , Issue.2 , pp. 115-162
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 4
    • 0002771903 scopus 로고
    • Non-deterministic exponential time has two-prover interactive protocols
    • L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover interactive protocols. Computational complexity, 1(1):3-40, 1991.
    • (1991) Computational Complexity , vol.1 , Issue.1 , pp. 3-40
    • Babai, L.1    Fortnow, L.2    Lund, C.3
  • 5
    • 0023995534 scopus 로고
    • ARTHUR-MERLIN GAMES: A RANDOMIZED PROOF SYSTEM, AND A HIERARCHY OF COMPLEXITY CLASSES
    • DOI 10.1016/0022-0000(88)90028-1
    • L. Babai and S. Moran. Arthur-merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36(2):254-276, 1988. (Pubitemid 18623335)
    • (1988) Journal of Computer and System Sciences , vol.36 , Issue.2 , pp. 254-276
    • Babai, L.1
  • 7
    • 0036294828 scopus 로고    scopus 로고
    • Universal arguments and their applications
    • B. Barak and O. Goldreich. Universal arguments and their applications. ccc, page 0194, 2002.
    • (2002) Ccc , pp. 0194
    • Barak, B.1    Goldreich, O.2
  • 12
    • 0003010182 scopus 로고
    • Verification of forecasts expressed in terms of probability
    • G.W. Brier. Verification of forecasts expressed in terms of probability. Monthly weather review, 1950.
    • (1950) Monthly Weather Review
    • Brier, G.W.1
  • 15
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • K.M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. Advances in Cryptology-CRYPTO 2010, pages 483-501, 2010.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 483-501
    • Chung, K.M.1    Kalai, Y.2    Vadhan, S.3
  • 17
    • 84856489354 scopus 로고    scopus 로고
    • Secure two-party computation with low communication
    • ePrint Archive, Report 2011/508
    • Ivan Damgård, Sebastian Faust, and Carmit Hazay. Secure two-party computation with low communication. Cryptology ePrint Archive, Report 2011/508, 2011.
    • (2011) Cryptology
    • Damgård, I.1    Faust, S.2    Hazay, C.3
  • 19
    • 0028544648 scopus 로고
    • On the power of multi-prover interactive protocols
    • L. Fortnow, J. Rompel, and M. Sipser. On the power of multi-prover interactive protocols. Theoretical Computer Science, 134(2):545-557, 1994.
    • (1994) Theoretical Computer Science , vol.134 , Issue.2 , pp. 545-557
    • Fortnow, L.1    Rompel, J.2    Sipser, M.3
  • 20
    • 57649186577 scopus 로고    scopus 로고
    • The complexity of forecast testing
    • L. Fortnow and R.V. Vohra. The complexity of forecast testing. Econometrica, 77(1):93-105, 2009.
    • (2009) Econometrica , vol.77 , Issue.1 , pp. 93-105
    • Fortnow, L.1    Vohra, R.V.2
  • 21
    • 0024057387 scopus 로고
    • Are there interactive protocols for co-np languages?
    • Lance Fortnow and Michael Sipser. Are there interactive protocols for co-np languages? Information Processing Letters, 28:249-251, 1988.
    • (1988) Information Processing Letters , vol.28 , pp. 249-251
    • Fortnow, L.1    Sipser, M.2
  • 22
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Advances in Cryptology-CRYPTO 2010, pages 465-482, 2010.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 32
    • 40249118370 scopus 로고    scopus 로고
    • Bridging game theory and cryptography: Recent results and future directions
    • J. Katz. Bridging game theory and cryptography: Recent results and future directions. Theory of Cryptography, pages 251-272, 2008.
    • (2008) Theory of Cryptography , pp. 251-272
    • Katz, J.1
  • 34
    • 0026930922 scopus 로고
    • Algebraic methods for interactive proof systems
    • DOI 10.1145/146585.146605
    • C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic methods for interactive proof systems. Journal of the ACM (JACM), 39(4):859-868, 1992. (Pubitemid 23600385)
    • (1992) Journal of the ACM , vol.39 , Issue.4 , pp. 859-868
    • Lund, C.1    Fortnow, L.2    Karloff, H.3    Nisan, N.4
  • 35
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • DOI 10.1137/S0097539795284959, PII S0097539795284959
    • S. Micali. Computationally sound proofs. SIAM Journal on Computing, 30(4):1253-1298, 2001. (Pubitemid 32837894)
    • (2001) SIAM Journal on Computing , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 37
    • 0346991618 scopus 로고    scopus 로고
    • The reproducible properties of correct forecasts
    • DOI 10.1007/s001820300153
    • A. Sandroni. The reproducible properties of correct forecasts. International Journal of Game Theory, 32(1):151-159, 2003. (Pubitemid 37550825)
    • (2003) International Journal of Game Theory , vol.32 , Issue.1 , pp. 151-159
    • Sandroni, A.1
  • 38
    • 84856451713 scopus 로고    scopus 로고
    • Delegation of computation without rejection problem from designated verifier cs-proofs
    • ePrint Archive, Report 2011/456
    • Aviad Rubinstein Shaff Goldwasser, Huijia Lin. Delegation of computation without rejection problem from designated verifier cs-proofs. Cryptology ePrint Archive, Report 2011/456, 2011.
    • (2011) Cryptology
    • Rubinstein, A.1    Goldwasser, S.2    Lin, H.3
  • 40
    • 25444462746 scopus 로고    scopus 로고
    • Non-cooperative computation: Boolean functions with correctness and exclusivity
    • DOI 10.1016/j.tcs.2005.05.009, PII S0304397505003117, Game Theory Meets Theoretical Computer Science
    • Y. Shoham and M. Tennenholtz. Non-cooperative computation: Boolean functions with correctness and exclusivity. Theoretical Computer Science, 343(1-2):97-113, 2005. (Pubitemid 41360147)
    • (2005) Theoretical Computer Science , vol.343 , Issue.1-2 , pp. 97-113
    • Shoham, Y.1    Tennenholtz, M.2
  • 41
    • 0026239342 scopus 로고
    • Pp is as hard as the polynomial-time hierarchy
    • S. Toda. Pp is as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 20:865, 1991.
    • (1991) SIAM Journal on Computing , vol.20 , pp. 865
    • Toda, S.1
  • 42
    • 0000027812 scopus 로고
    • Complexity classes defined by counting quantifiers
    • J. Torán. Complexity classes defined by counting quantifiers. Journal of the ACM (JACM), 38(3):752-773, 1991.
    • (1991) Journal of the ACM (JACM) , vol.38 , Issue.3 , pp. 752-773
    • Torán, J.1
  • 43
    • 0022733806 scopus 로고
    • The complexity of combinatorial problems with succinct input representation
    • K.W. Wagner. The complexity of combinatorial problems with succinct input representation. Acta Informatica, 23(3):325-356, 1986.
    • (1986) Acta Informatica , vol.23 , Issue.3 , pp. 325-356
    • Wagner, K.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.