-
1
-
-
77955319555
-
From secrecy to soundness: efficient verification via secure computation
-
Springer-Verlag
-
[1] Applebaum, B., Ishai, Y., Kushilevitz, E., From secrecy to soundness: efficient verification via secure computation. Proceedings of the 37th International Colloquium Conference on Automata, Languages and Programming, 2010, Springer-Verlag, 152–163.
-
(2010)
Proceedings of the 37th International Colloquium Conference on Automata, Languages and Programming
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
2
-
-
0031651077
-
Probabilistic checking of proofs: a new characterization of NP
-
[2] Arora, S., Safra, S., Probabilistic checking of proofs: a new characterization of NP. J. ACM 45 (1998), 70–122.
-
(1998)
J. ACM
, vol.45
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
3
-
-
85028539051
-
Checking computations in polylogarithmic time
-
ACM
-
[3] Babai, L., Fortnow, L., Levin, L.A., Szegedy, M., Checking computations in polylogarithmic time. Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, 1991, ACM, 21–32.
-
(1991)
Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing
, pp. 21-32
-
-
Babai, L.1
Fortnow, L.2
Levin, L.A.3
Szegedy, M.4
-
4
-
-
57849098189
-
Universal arguments and their applications
-
[4] Barak, B., Goldreich, O., Universal arguments and their applications. SIAM J. Comput. 38 (2008), 1661–1694.
-
(2008)
SIAM J. Comput.
, vol.38
, pp. 1661-1694
-
-
Barak, B.1
Goldreich, O.2
-
5
-
-
0031334110
-
Does parallel repetition lower the error in computationally sound protocols?
-
IEEE Computer Society
-
[5] Bellare, M., Impagliazzo, R., Naor, M., Does parallel repetition lower the error in computationally sound protocols?. Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997, IEEE Computer Society, 374–383.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 374-383
-
-
Bellare, M.1
Impagliazzo, R.2
Naor, M.3
-
6
-
-
84898945449
-
Multi-prover interactive proofs: how to remove intractability assumptions
-
ACM
-
[6] Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A., Multi-prover interactive proofs: how to remove intractability assumptions. Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, 1988, ACM, 113–131.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
7
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Springer-Verlag
-
[7] Benabbas, S., Gennaro, R., Vahlis, Y., Verifiable delegation of computation over large datasets. Proceedings of the 31st Annual Conference on Advances in Cryptology, 2011, Springer-Verlag, 111–131.
-
(2011)
Proceedings of the 31st Annual Conference on Advances in Cryptology
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
8
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
ACM
-
[8] Bitansky, N., Canetti, R., Chiesa, A., Tromer, E., From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012, ACM, 326–349.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
, pp. 326-349
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
9
-
-
84996470282
-
Validation and replication
-
[9] BOINC, Validation and replication. http://boinc.berkeley.edu/trac/wiki/ValidationSummary, 2011.
-
(2011)
-
-
BOINC1
-
10
-
-
24144435673
-
Hardness amplification of weakly verifiable puzzles
-
Springer-Verlag
-
[10] Canetti, R., Halevi, S., Steiner, M., Hardness amplification of weakly verifiable puzzles. Proceedings of the Second Theory of Cryptography Conference, 2005, Springer-Verlag, 17–33.
-
(2005)
Proceedings of the Second Theory of Cryptography Conference
, pp. 17-33
-
-
Canetti, R.1
Halevi, S.2
Steiner, M.3
-
11
-
-
80755169473
-
Practical delegation of computation using multiple servers
-
ACM
-
[11] Canetti, R., Riva, B., Rothblum, G.N., Practical delegation of computation using multiple servers. Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, ACM, 445–454.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 445-454
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.N.3
-
12
-
-
84903564833
-
Refereed delegation of computation
-
[12] Canetti, R., Riva, B., Rothblum, G.N., Refereed delegation of computation. http://www.cs.tau.ac.il/~canetti/CRR11.pdf, 2011.
-
(2011)
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.N.3
-
13
-
-
84996445774
-
Verifiable computation with two or more clouds
-
in: Workshop on Cryptography and Security in Clouds
-
[13] Canetti, R., Riva, B., Rothblum, G.N., Verifiable computation with two or more clouds. in: Workshop on Cryptography and Security in Clouds http://www.zurich.ibm.com/~cca/csc2011, 2011.
-
(2011)
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.N.3
-
14
-
-
84865027989
-
Two protocols for delegation of computation
-
Springer-Verlag
-
[14] Canetti, R., Riva, B., Rothblum, G.N., Two protocols for delegation of computation. Proceedings of the 6th International Conference on Information Theoretic Security, 2012, Springer-Verlag, 37–61.
-
(2012)
Proceedings of the 6th International Conference on Information Theoretic Security
, pp. 37-61
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.N.3
-
15
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Springer-Verlag
-
[15] Chung, K.M., Kalai, Y., Vadhan, S., Improved delegation of computation using fully homomorphic encryption. Proceedings of the 30th Annual Conference on Advances in Cryptology, 2010, Springer-Verlag, 483–501.
-
(2010)
Proceedings of the 30th Annual Conference on Advances in Cryptology
, pp. 483-501
-
-
Chung, K.M.1
Kalai, Y.2
Vadhan, S.3
-
16
-
-
80051994919
-
Memory delegation
-
Springer-Verlag
-
[16] Chung, K.M., Kalai, Y.T., Liu, F.H., Raz, R., Memory delegation. Proceedings of the 31st Annual Conference on Advances in Cryptology, 2011, Springer-Verlag, 151–165.
-
(2011)
Proceedings of the 31st Annual Conference on Advances in Cryptology
, pp. 151-165
-
-
Chung, K.M.1
Kalai, Y.T.2
Liu, F.H.3
Raz, R.4
-
17
-
-
84856468957
-
Practical verified computation with streaming interactive proofs
-
ACM
-
[17] Cormode, G., Mitzenmacher, M., Thaler, J., Practical verified computation with streaming interactive proofs. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012, ACM, 90–112.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
, pp. 90-112
-
-
Cormode, G.1
Mitzenmacher, M.2
Thaler, J.3
-
18
-
-
45849090390
-
Succinct NP proofs from an extractability assumption
-
Springer-Verlag
-
[18] Crescenzo, G., Lipmaa, H., Succinct NP proofs from an extractability assumption. Proceedings of the 4th Conference on Computability in Europe: Logic and Theory of Algorithms, 2008, Springer-Verlag, 175–185.
-
(2008)
Proceedings of the 4th Conference on Computability in Europe: Logic and Theory of Algorithms
, pp. 175-185
-
-
Crescenzo, G.1
Lipmaa, H.2
-
19
-
-
84858313411
-
Secure two-party computation with low communication
-
Springer
-
[19] Damgård, I., Faust, S., Hazay, C., Secure two-party computation with low communication. Proceedings of the 9th Theory of Cryptography Conference, 2012, Springer, 54–74.
-
(2012)
Proceedings of the 9th Theory of Cryptography Conference
, pp. 54-74
-
-
Damgård, I.1
Faust, S.2
Hazay, C.3
-
20
-
-
84996427562
-
DynInst, an application program interface for runtime code generation
-
[20] DynInst, an application program interface for runtime code generation. http://www.dyninst.org, 2011.
-
(2011)
-
-
-
21
-
-
0030646746
-
Making games short (extended abstract)
-
ACM
-
[21] Feige, U., Kilian, J., Making games short (extended abstract). Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, 1997, ACM, 506–516.
-
(1997)
Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing
, pp. 506-516
-
-
Feige, U.1
Kilian, J.2
-
22
-
-
77957005936
-
Non-interactive verifiable computing: outsourcing computation to untrusted workers
-
Springer-Verlag
-
[22] Gennaro, R., Gentry, C., Parno, B., Non-interactive verifiable computing: outsourcing computation to untrusted workers. Proceedings of the 30th Annual Conference on Advances in Cryptology, 2010, Springer-Verlag, 465–482.
-
(2010)
Proceedings of the 30th Annual Conference on Advances in Cryptology
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
23
-
-
57049095424
-
Delegating computation: interactive proofs for muggles
-
ACM
-
[23] Goldwasser, S., Kalai, Y.T., Rothblum, G.N., Delegating computation: interactive proofs for muggles. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008, ACM, 113–122.
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
24
-
-
84856451713
-
Delegation of computation without rejection problem from designated verifier cs-proofs
-
Cryptology ePrint Archive, Report 2011/456
-
[24] Goldwasser, S., Lin, H., Rubinstein, A., Delegation of computation without rejection problem from designated verifier cs-proofs. Cryptology ePrint Archive, Report 2011/456, 2011.
-
(2011)
-
-
Goldwasser, S.1
Lin, H.2
Rubinstein, A.3
-
25
-
-
84937555419
-
Uncheatable distributed computations
-
Springer
-
[25] Golle, P., Mironov, I., Uncheatable distributed computations. Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographerʼs Track at RSA, 2001, Springer, 425–440.
-
(2001)
Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographerʼs Track at RSA
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
27
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
ACM
-
[27] Haeberlen, A., Kuznetsov, P., Druschel, P., PeerReview: Practical accountability for distributed systems. Proceedings of the 21st ACM Symposium on Operating Systems Principles, 2007, ACM, 175–188.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 175-188
-
-
Haeberlen, A.1
Kuznetsov, P.2
Druschel, P.3
-
28
-
-
70350343384
-
Probabilistically checkable arguments
-
Springer-Verlag
-
[28] Kalai, Y.T., Raz, R., Probabilistically checkable arguments. Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, 2009, Springer-Verlag, 143–159.
-
(2009)
Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
, pp. 143-159
-
-
Kalai, Y.T.1
Raz, R.2
-
30
-
-
84996447457
-
Competing provers protocols for circuit evaluation
-
Technical Report TR11-122, Electronic Colloquium on Computational Complexity
-
[30] Kol, G., Raz, R., Competing provers protocols for circuit evaluation. Technical Report TR11-122, Electronic Colloquium on Computational Complexity, 2011 http://eccc.hpi-web.de/.
-
(2011)
-
-
Kol, G.1
Raz, R.2
-
31
-
-
77952564111
-
PEBIL: Efficient static binary instrumentation for linux
-
ISPASS, pp. 175–183.
-
[31] M. Laurenzano, M.M. Tikir, L. Carrington, A. Snavely, PEBIL: Efficient static binary instrumentation for linux, in: ISPASS, pp. 175–183.
-
-
-
Laurenzano, M.1
Tikir, M.M.2
Carrington, L.3
Snavely, A.4
-
32
-
-
31944440969
-
Pin: building customized program analysis tools with dynamic instrumentation
-
ACM
-
[32] Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K., Pin: building customized program analysis tools with dynamic instrumentation. Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2005, ACM, 190–200.
-
(2005)
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
33
-
-
0026930922
-
Algebraic methods for interactive proof systems
-
[33] Lund, C., Fortnow, L., Karloff, H., Nisan, N., Algebraic methods for interactive proof systems. J. ACM 39 (1992), 859–868.
-
(1992)
J. ACM
, vol.39
, pp. 859-868
-
-
Lund, C.1
Fortnow, L.2
Karloff, H.3
Nisan, N.4
-
34
-
-
55149108173
-
Flicker: an execution infrastructure for tcb minimization
-
ACM
-
[34] McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H., Flicker: an execution infrastructure for tcb minimization. Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, 2008, ACM, 315–328.
-
(2008)
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
36
-
-
0034854953
-
Computationally sound proofs
-
[36] Micali, S., Computationally sound proofs. SIAM J. Comput. 30 (2000), 1253–1298.
-
(2000)
SIAM J. Comput.
, vol.30
, pp. 1253-1298
-
-
Micali, S.1
-
37
-
-
85174664325
-
Distributed execution with remote audit
-
The Internet Society
-
[37] Monrose, F., Wycko, P., Rubin, A.D., Distributed execution with remote audit. Proceedings of the 1999 ISOC Network and Distributed System Security Symposium, 1999, The Internet Society, 103–113.
-
(1999)
Proceedings of the 1999 ISOC Network and Distributed System Security Symposium
, pp. 103-113
-
-
Monrose, F.1
Wycko, P.2
Rubin, A.D.3
-
38
-
-
84996445779
-
PyEmu, a python IA-32 emulator
-
[38] PyEmu, a python IA-32 emulator. http://code.google.com/p/pyemu, 2011.
-
(2011)
-
-
-
39
-
-
84996427806
-
Quinʼs source code
-
[39] Quinʼs source code. http://www.cs.tau.ac.il/~benriva/quin, 2011.
-
(2011)
-
-
-
40
-
-
77957014584
-
Delegating computation reliably: paradigms and constructions
-
PhD thesis Massachusetts Institute of Technology
-
[40] Rothblum, G.N., Delegating computation reliably: paradigms and constructions. PhD thesis, 2009, Massachusetts Institute of Technology.
-
(2009)
-
-
Rothblum, G.N.1
-
41
-
-
27544477855
-
A fine-grained attestation service for secure distributed systems
-
IEEE Computer Society
-
[41] Shi, E., Perrig, A., Doorn Bind, L.V., A fine-grained attestation service for secure distributed systems. Proceedings of the 2005 IEEE Symposium on Security and Privacy, 2005, IEEE Computer Society, 154–168.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Doorn Bind, L.V.3
|