-
1
-
-
77955319555
-
From secrecy to soundness: Efficient verification via secure computation
-
S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. G. Spirakis, editors Springer
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. From secrecy to soundness: Efficient verification via secure computation. In S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. G. Spirakis, editors, ICALP (1), Volume 6198 of Lecture Notes in Computer Science, pages 152-163. Springer, 2010.
-
(2010)
ICALP (1), Volume 6198 of Lecture Notes in Computer Science
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
2
-
-
84862599114
-
Rational proofs
-
H. J. Karloff and T. Pitassi, editors ACM
-
P. D. Azar and S. Micali. Rational proofs. In H. J. Karloff and T. Pitassi, editors, STOC, pages 1017-1028. ACM, 2012.
-
(2012)
STOC
, pp. 1017-1028
-
-
Azar, P.D.1
Micali, S.2
-
3
-
-
84893334389
-
Super-efficient rational proofs
-
M. Kearns, R. P. McAfee, and É. Tardos, editors ACM
-
P. D. Azar and S. Micali. Super-efficient rational proofs. In M. Kearns, R. P. McAfee, and É. Tardos, editors, ACM Conference on Electronic Commerce, pages 29-30. ACM, 2013.
-
(2013)
ACM Conference on Electronic Commerce
, pp. 29-30
-
-
Azar, P.D.1
Micali, S.2
-
4
-
-
84873941196
-
Succinct non-interactive arguments via linear interactive proofs
-
N. Bitansky, A. Chiesa, Y. Ishai, R. Ostrovsky, and O. Paneth. Succinct non-interactive arguments via linear interactive proofs. In TCC, pages 315-333, 2013.
-
(2013)
TCC
, pp. 315-333
-
-
Bitansky, N.1
Chiesa, A.2
Ishai, Y.3
Ostrovsky, R.4
Paneth, O.5
-
5
-
-
0003010182
-
Verification of forecasts expressed in terms of probability
-
G. W. Brier. Verification of forecasts expressed in terms of probability. Monthly Weather Review, 78(1): 1-3, 1950.
-
(1950)
Monthly Weather Review
, vol.78
, Issue.1
, pp. 1-3
-
-
Brier, G.W.1
-
6
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
J. Stern, editor Springer
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In J. Stern, editor, EUROCRYPT, Volume 1592 of Lecture Notes in Computer Science, pages 402-414. Springer, 1999.
-
(1999)
EUROCRYPT, Volume 1592 of Lecture Notes in Computer Science
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
T. Rabin, editor Springer
-
K.-M. Chung, Y. T. Kalai, and S. P. Vadhan. Improved delegation of computation using fully homomorphic encryption. In T. Rabin, editor, CRYPTO, Volume 6223 of Lecture Notes in Computer Science, pages 483-501. Springer, 2010.
-
(2010)
CRYPTO, Volume 6223 of Lecture Notes in Computer Science
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.T.2
Vadhan, S.P.3
-
9
-
-
84856468957
-
Practical verified computation with streaming interactive proofs
-
S. Goldwasser, editor ACM
-
G. Cormode, M. Mitzenmacher, and J. Thaler. Practical verified computation with streaming interactive proofs. In S. Goldwasser, editor, ITCS, pages 90-112. ACM, 2012.
-
(2012)
ITCS
, pp. 90-112
-
-
Cormode, G.1
Mitzenmacher, M.2
Thaler, J.3
-
10
-
-
84858313411
-
Secure two-party computation with low communication
-
R. Cramer, editor Springer
-
I. Damgård, S. Faust, and C. Hazay. Secure two-party computation with low communication. In R. Cramer, editor, TCC, Volume 7194 of Lecture Notes in Computer Science, pages 54-74. Springer, 2012.
-
(2012)
TCC, Volume 7194 of Lecture Notes in Computer Science
, pp. 54-74
-
-
Damgård, I.1
Faust, S.2
Hazay, C.3
-
11
-
-
45849135468
-
-
C. Dwork, M. Langberg, M. Naor, K. Nissim, and O. Reingold. Succinct NP proofs and spooky interactions. Available at www.openu.ac.il/home/mikel/papers/ spooky.ps, 2004.
-
(2004)
Succinct NP Proofs and Spooky Interactions
-
-
Dwork, C.1
Langberg, M.2
Naor, M.3
Nissim, K.4
Reingold, O.5
-
12
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
T. Rabin, editor Springer
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In T. Rabin, editor, CRYPTO, Volume 6223 of Lecture Notes in Computer Science, pages 465-482. Springer, 2010.
-
(2010)
CRYPTO, Volume 6223 of Lecture Notes in Computer Science
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
13
-
-
84865482277
-
Quadratic span programs and succinct NIZKs without PCPs
-
R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct NIZKs without PCPs. IACR Cryptology ePrint Archive, 2012: 215, 2012.
-
(2012)
IACR Cryptology EPrint Archive
, vol.2012
, pp. 215
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
Raykova, M.4
-
14
-
-
79959724747
-
Separating succinct non-interactive arguments from all falsifiable assumptions
-
L. Fortnow and S. P. Vadhan, editors ACM
-
C. Gentry and D. Wichs. Separating succinct non-interactive arguments from all falsifiable assumptions. In L. Fortnow and S. P. Vadhan, editors, STOC, pages 99-108. ACM, 2011.
-
(2011)
STOC
, pp. 99-108
-
-
Gentry, C.1
Wichs, D.2
-
15
-
-
33947274775
-
Strictly proper scoring rules, prediction, and estimation
-
T. Gneiting and A. E. Raftery. Strictly proper scoring rules, prediction, and estimation. Journal of the American Statistical Association, 102: 359-378, 2007.
-
(2007)
Journal of the American Statistical Association
, vol.102
, pp. 359-378
-
-
Gneiting, T.1
Raftery, A.E.2
-
16
-
-
0242381728
-
On interactive proofs with a laconic prover
-
O. Goldreich, S. P. Vadhan, and A. Wigderson. On interactive proofs with a laconic prover. Computational Complexity, 11(1-2): 1-53, 2002.
-
(2002)
Computational Complexity
, vol.11
, Issue.1-2
, pp. 1-53
-
-
Goldreich, O.1
Vadhan, S.P.2
Wigderson, A.3
-
17
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
C. Dwork, editor ACM
-
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: interactive proofs for muggles. In C. Dwork, editor, STOC, pages 113-122. ACM, 2008.
-
(2008)
STOC
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
18
-
-
78650812215
-
Short pairing-based non-interactive zero-knowledge arguments
-
M. Abe, editor Springer
-
J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In M. Abe, editor, ASIACRYPT, Volume 6477 of Lecture Notes in Computer Science, pages 321-340. Springer, 2010.
-
(2010)
ASIACRYPT, Volume 6477 of Lecture Notes in Computer Science
, pp. 321-340
-
-
Groth, J.1
-
19
-
-
70350343384
-
Probabilistically checkable arguments
-
S. Halevi, editor Springer
-
Y. T. Kalai and R. Raz. Probabilistically checkable arguments. In S. Halevi, editor, CRYPTO, Volume 5677 of Lecture Notes in Computer Science, pages 143-159. Springer, 2009.
-
(2009)
CRYPTO, Volume 5677 of Lecture Notes in Computer Science
, pp. 143-159
-
-
Kalai, Y.T.1
Raz, R.2
-
20
-
-
84879827428
-
Delegation for bounded space
-
D. Boneh, T. Roughgarden, and J. Feigenbaum, editors ACM
-
Y. T. Kalai, R. Raz, and R. D. Rothblum. Delegation for bounded space. In D. Boneh, T. Roughgarden, and J. Feigenbaum, editors, STOC, pages 565-574. ACM, 2013.
-
(2013)
STOC
, pp. 565-574
-
-
Kalai, Y.T.1
Raz, R.2
Rothblum, R.D.3
-
21
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments (extended abstract)
-
S. R. Kosaraju, M. Fellows, A. Wigderson, and J. A. Ellis, editors ACM
-
J. Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In S. R. Kosaraju, M. Fellows, A. Wigderson, and J. A. Ellis, editors, STOC, pages 723-732. ACM, 1992.
-
(1992)
STOC
, pp. 723-732
-
-
Kilian, J.1
-
22
-
-
84873326525
-
Competing provers protocols for circuit evaluation
-
R. D. Kleinberg, editor ACM
-
G. Kol and R. Raz. Competing provers protocols for circuit evaluation. In R. D. Kleinberg, editor, ITCS, pages 473-484. ACM, 2013.
-
(2013)
ITCS
, pp. 473-484
-
-
Kol, G.1
Raz, R.2
-
23
-
-
84858312040
-
Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
-
R. Cramer, editor Springer
-
H. Lipmaa. Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In R. Cramer, editor, TCC, Volume 7194 of Lecture Notes in Computer Science, pages 169-189. Springer, 2012.
-
(2012)
TCC, Volume 7194 of Lecture Notes in Computer Science
, pp. 169-189
-
-
Lipmaa, H.1
-
24
-
-
0034854953
-
Computationally sound proofs
-
S. Micali. Computationally sound proofs. SIAM J. Comput., 30(4): 1253-1298, 2000.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
25
-
-
4243054954
-
Number-theoretic constructions of efficient pseudo-random functions
-
M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudo-random functions. J. ACM, 51(2): 231-262, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
26
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
R. Cramer, editor Springer
-
B. Parno, M. Raykova, and V. Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In R. Cramer, editor, TCC, Volume 7194 of Lecture Notes in Computer Science, pages 422-439. Springer, 2012.
-
(2012)
TCC, Volume 7194 of Lecture Notes in Computer Science
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
27
-
-
0026932814
-
On threshold circuits and polynomial computation
-
J. H. Reif and S. R. Tate. On threshold circuits and polynomial computation. SIAM J. Comput., 21(5): 896-908, 1992.
-
(1992)
SIAM J. Comput.
, vol.21
, Issue.5
, pp. 896-908
-
-
Reif, J.H.1
Tate, S.R.2
-
28
-
-
84879820967
-
Interactive proofs of proximity: Delegating computation in sublinear time
-
D. Boneh, T. Roughgarden, and J. Feigenbaum, editors ACM
-
G. N. Rothblum, S. P. Vadhan, and A. Wigderson. Interactive proofs of proximity: delegating computation in sublinear time. In D. Boneh, T. Roughgarden, and J. Feigenbaum, editors, STOC, pages 793-802. ACM, 2013.
-
(2013)
STOC
, pp. 793-802
-
-
Rothblum, G.N.1
Vadhan, S.P.2
Wigderson, A.3
|