메뉴 건너뛰기




Volumn , Issue , 2013, Pages 71-84

Resolving the conflict between generality and plausibility in verified computation

Author keywords

[No Author keywords available]

Indexed keywords

BATCH VERIFICATION; GPU IMPLEMENTATION; PROBABILISTICALLY CHECKABLE PROOF; REAL PROBLEMS; RESEARCH QUESTIONS; RUNNING TIME; SECURE SYSTEM; VERIFIED COMPUTATIONS;

EID: 84877694382     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2465351.2465359     Document Type: Conference Paper
Times cited : (99)

References (58)
  • 1
    • 84877686573 scopus 로고    scopus 로고
    • CUDA (http://developer.nvidia.com/what-cuda).
    • CUDA
  • 3
    • 84877699516 scopus 로고    scopus 로고
    • Shootout/Fannkuch. http://www.haskell.org/haskellwiki/Shootout/Fannkuch.
    • Shootout/Fannkuch
  • 6
    • 0032058198 scopus 로고    scopus 로고
    • Proof Verification and the Hardness of Approximation Problems
    • S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. J. of the ACM, 45(3):501-555, May 1998. (Pubitemid 128506634)
    • (1998) Journal of the ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 7
    • 0031651077 scopus 로고    scopus 로고
    • Probabilistic checking of proofs: A new characterization of NP
    • S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. J. of the ACM, 45(1):70-122, Jan. 1998. (Pubitemid 128615465)
    • (1998) Journal of the ACM , vol.45 , Issue.1 , pp. 70-122
    • Arora, S.1    Safra, S.2
  • 9
    • 84873389393 scopus 로고    scopus 로고
    • Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
    • E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. Fast reductions from RAMs to delegatable succinct constraint satisfaction problems. In ITCS, 2013.
    • (2013) ITCS
    • Ben-Sasson, E.1    Chiesa, A.2    Genkin, D.3    Tromer, E.4
  • 10
    • 84879809515 scopus 로고    scopus 로고
    • On the concrete-efficiency threshold of probabilistically-checkable proofs
    • To appear
    • E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. On the concrete-efficiency threshold of probabilistically-checkable proofs. In STOC, 2013. To appear.
    • (2013) STOC
    • Ben-Sasson, E.1    Chiesa, A.2    Genkin, D.3    Tromer, E.4
  • 12
    • 55249095082 scopus 로고    scopus 로고
    • Short PCPs with polylog query complexity
    • May
    • E. Ben-Sasson and M. Sudan. Short PCPs with polylog query complexity. SIAM J. on Comp., 38(2):551-607, May 2008.
    • (2008) SIAM J. on Comp. , vol.38 , Issue.2 , pp. 551-607
    • Ben-Sasson, E.1    Sudan, M.2
  • 14
    • 4944240756 scopus 로고    scopus 로고
    • Barycentric Lagrange interpolation
    • J.-P. Berrut and L. N. Trefethen. Barycentric Lagrange interpolation. SIAM Review, 46(3):501-517, 2004.
    • (2004) SIAM Review , vol.46 , Issue.3 , pp. 501-517
    • Berrut, J.-P.1    Trefethen, L.N.2
  • 15
  • 18
    • 79957455464 scopus 로고    scopus 로고
    • Fail-aware untrusted storage
    • Apr.
    • C. Cachin, I. Keidar, and A. Shraer. Fail-aware untrusted storage. SIAM J. on Comp., 40(2):493-533, Apr. 2011.
    • (2011) SIAM J. on Comp. , vol.40 , Issue.2 , pp. 493-533
    • Cachin, C.1    Keidar, I.2    Shraer, A.3
  • 19
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • DOI 10.1145/571637.571640
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. on Comp. Sys., 20(4):398-461, Nov. 2002. (Pubitemid 135702591)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 20
    • 84877723204 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • K.-M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. In CRYPTO 2010.
    • CRYPTO 2010
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 21
    • 84968470212 scopus 로고
    • An algorithm for the machine calculation of complex fourier series
    • J. W. Cooley and J. W. Tukey. An algorithm for the machine calculation of complex fourier series. Mathematics of Computation, 19(90):297-301, 1965.
    • (1965) Mathematics of Computation , vol.19 , Issue.90 , pp. 297-301
    • Cooley, J.W.1    Tukey, J.W.2
  • 23
    • 84856468957 scopus 로고    scopus 로고
    • Practical verified computation with streaming interactive proofs
    • G. Cormode, M. Mitzenmacher, and J. Thaler. Practical verified computation with streaming interactive proofs. In ITCS, 2012.
    • (2012) ITCS
    • Cormode, G.1    Mitzenmacher, M.2    Thaler, J.3
  • 24
    • 34250354807 scopus 로고    scopus 로고
    • The PCP theorem by gap amplification
    • June
    • I. Dinur. The PCP theorem by gap amplification. J. of the ACM, 54(3), June 2007.
    • (2007) J. of the ACM , vol.54 , Issue.3
    • Dinur, I.1
  • 25
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Info. Theory, 31(4):469-472, 1985.
    • (1985) IEEE Trans. on Info. Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 26
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 27
    • 84889679875 scopus 로고    scopus 로고
    • Quadratic span programs and succinct NIZKs without PCPs
    • Report 2012/215, 2012. To appear in EUROCRYPT 2013
    • R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct NIZKs without PCPs. Cryptology ePrint Archive, Report 2012/215, 2012. To appear in EUROCRYPT 2013.
    • Cryptology ePrint Archive
    • Gennaro, R.1    Gentry, C.2    Parno, B.3    Raykova, M.4
  • 29
    • 84865663852 scopus 로고    scopus 로고
    • Homomorphic evaluation of the AES circuit
    • C. Gentry, S. Halevi, and N. Smart. Homomorphic evaluation of the AES circuit. In CRYPTO, 2012.
    • (2012) CRYPTO
    • Gentry, C.1    Halevi, S.2    Smart, N.3
  • 30
    • 57049095424 scopus 로고    scopus 로고
    • Delegating computation: Interactive proofs for muggles
    • S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: Interactive proofs for muggles. In STOC, 2008.
    • (2008) STOC
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 31
    • 79952505412 scopus 로고    scopus 로고
    • Short pairing-based non-interactive zero-knowledge arguments
    • J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In ASIACRYPT, 2010.
    • (2010) ASIACRYPT
    • Groth, J.1
  • 32
    • 58049120018 scopus 로고    scopus 로고
    • PeerReview: Practical accountability for distributed systems
    • A. Haeberlen, P. Kouznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In SOSP, 2007.
    • (2007) SOSP
    • Haeberlen, A.1    Kouznetsov, P.2    Druschel, P.3
  • 34
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments
    • extended abstract
    • J. Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In STOC, 1992.
    • (1992) STOC
    • Kilian, J.1
  • 35
    • 0006740356 scopus 로고    scopus 로고
    • Seminumerical Algorithms
    • Addison-Wesley, third edition
    • D. E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, third edition, 1997.
    • (1997) The Art of Computer Programming , vol.2
    • Knuth, D.E.1
  • 37
    • 84877689990 scopus 로고    scopus 로고
    • Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
    • H. Lipmaa. Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In IACR TCC, 2011.
    • (2011) IACR TCC
    • Lipmaa, H.1
  • 39
    • 80755168310 scopus 로고    scopus 로고
    • VMCrypt: Modular software architecture for scalable secure computation
    • L. Malka. VMCrypt: Modular software architecture for scalable secure computation. In ACM CCS, 2011.
    • (2011) ACM CCS
    • Malka, L.1
  • 41
    • 0032306029 scopus 로고    scopus 로고
    • Byzantine quorum systems
    • D. Malkhi and M. Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203-213, 1998. (Pubitemid 128489949)
    • (1998) Distributed Computing , vol.11 , Issue.4 , pp. 203-213
    • Malkhi, D.1    Reiter, M.2
  • 43
    • 85174664325 scopus 로고    scopus 로고
    • Distributed execution with remote audit
    • F. Monrose, P. Wycko, and A. D. Rubin. Distributed execution with remote audit. In NDSS, 1999.
    • (1999) NDSS
    • Monrose, F.1    Wycko, P.2    Rubin, A.D.3
  • 47
    • 0018456413 scopus 로고
    • Relations among complexity measures
    • Apr.
    • N. Pippenger and M. J. Fischer. Relations among complexity measures. J. of the ACM, 26(2):361-381, Apr. 1979.
    • (1979) J. of the ACM , vol.26 , Issue.2 , pp. 361-381
    • Pippenger, N.1    Fischer, M.J.2
  • 48
    • 79951998286 scopus 로고    scopus 로고
    • Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency
    • A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In TRUST, 2010.
    • (2010) TRUST
    • Sadeghi, A.-R.1    Schneider, T.2    Winandy, M.3
  • 49
    • 33748537883 scopus 로고    scopus 로고
    • Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In SOSP, 2005.
    • (2005) SOSP
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    Van Doorn, L.5    Khosla, P.6
  • 50
    • 85092637329 scopus 로고    scopus 로고
    • Toward practical and unconditional verification of remote computations
    • S. Setty, A. J. Blumberg, and M. Walfish. Toward practical and unconditional verification of remote computations. In HotOS, 2011.
    • (2011) HotOS
    • Setty, S.1    Blumberg, A.J.2    Walfish, M.3
  • 52
    • 85180792160 scopus 로고    scopus 로고
    • Making argument systems for outsourced computation practical (sometimes)
    • S. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In NDSS, 2012.
    • (2012) NDSS
    • Setty, S.1    McPherson, R.2    Blumberg, A.J.3    Walfish, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.