메뉴 건너뛰기




Volumn , Issue , 2014, Pages 523-539

Rational arguments: Single round delegation with sublinear verification

Author keywords

Delegation of Computation; Rational Cryptography; Succinct Arguments; Threshold Circuits

Indexed keywords

THRESHOLD LOGIC;

EID: 84893284656     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2554797.2554845     Document Type: Conference Paper
Times cited : (37)

References (29)
  • 1
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. G. Spirakis, editors Springer
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. From secrecy to soundness: Efficient verification via secure computation. In S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. G. Spirakis, editors, ICALP (1), Volume 6198 of Lecture Notes in Computer Science, pages 152-163. Springer, 2010.
    • (2010) ICALP (1), Volume 6198 of Lecture Notes in Computer Science , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 2
    • 84862599114 scopus 로고    scopus 로고
    • Rational proofs
    • H. J. Karloff and T. Pitassi, editors ACM
    • P. D. Azar and S. Micali. Rational proofs. In H. J. Karloff and T. Pitassi, editors, STOC, pages 1017-1028. ACM, 2012.
    • (2012) STOC , pp. 1017-1028
    • Azar, P.D.1    Micali, S.2
  • 3
    • 84893334389 scopus 로고    scopus 로고
    • Super-efficient rational proofs
    • M. Kearns, R. P. McAfee, and É. Tardos, editors ACM
    • P. D. Azar and S. Micali. Super-efficient rational proofs. In M. Kearns, R. P. McAfee, and É. Tardos, editors, ACM Conference on Electronic Commerce, pages 29-30. ACM, 2013.
    • (2013) ACM Conference on Electronic Commerce , pp. 29-30
    • Azar, P.D.1    Micali, S.2
  • 4
    • 84873941196 scopus 로고    scopus 로고
    • Succinct non-interactive arguments via linear interactive proofs
    • N. Bitansky, A. Chiesa, Y. Ishai, R. Ostrovsky, and O. Paneth. Succinct non-interactive arguments via linear interactive proofs. In TCC, pages 315-333, 2013.
    • (2013) TCC , pp. 315-333
    • Bitansky, N.1    Chiesa, A.2    Ishai, Y.3    Ostrovsky, R.4    Paneth, O.5
  • 5
    • 0003010182 scopus 로고
    • Verification of forecasts expressed in terms of probability
    • G. W. Brier. Verification of forecasts expressed in terms of probability. Monthly Weather Review, 78(1): 1-3, 1950.
    • (1950) Monthly Weather Review , vol.78 , Issue.1 , pp. 1-3
    • Brier, G.W.1
  • 6
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • J. Stern, editor Springer
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In J. Stern, editor, EUROCRYPT, Volume 1592 of Lecture Notes in Computer Science, pages 402-414. Springer, 1999.
    • (1999) EUROCRYPT, Volume 1592 of Lecture Notes in Computer Science , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 7
    • 84874940192 scopus 로고    scopus 로고
    • Refereed delegation of computation
    • R. Canetti, B. Riva, and G. N. Rothblum. Refereed delegation of computation. Inf. Comput., 226: 16-36, 2013.
    • (2013) Inf. Comput. , vol.226 , pp. 16-36
    • Canetti, R.1    Riva, B.2    Rothblum, G.N.3
  • 9
    • 84856468957 scopus 로고    scopus 로고
    • Practical verified computation with streaming interactive proofs
    • S. Goldwasser, editor ACM
    • G. Cormode, M. Mitzenmacher, and J. Thaler. Practical verified computation with streaming interactive proofs. In S. Goldwasser, editor, ITCS, pages 90-112. ACM, 2012.
    • (2012) ITCS , pp. 90-112
    • Cormode, G.1    Mitzenmacher, M.2    Thaler, J.3
  • 12
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • T. Rabin, editor Springer
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In T. Rabin, editor, CRYPTO, Volume 6223 of Lecture Notes in Computer Science, pages 465-482. Springer, 2010.
    • (2010) CRYPTO, Volume 6223 of Lecture Notes in Computer Science , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 14
    • 79959724747 scopus 로고    scopus 로고
    • Separating succinct non-interactive arguments from all falsifiable assumptions
    • L. Fortnow and S. P. Vadhan, editors ACM
    • C. Gentry and D. Wichs. Separating succinct non-interactive arguments from all falsifiable assumptions. In L. Fortnow and S. P. Vadhan, editors, STOC, pages 99-108. ACM, 2011.
    • (2011) STOC , pp. 99-108
    • Gentry, C.1    Wichs, D.2
  • 17
    • 57049095424 scopus 로고    scopus 로고
    • Delegating computation: Interactive proofs for muggles
    • C. Dwork, editor ACM
    • S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: interactive proofs for muggles. In C. Dwork, editor, STOC, pages 113-122. ACM, 2008.
    • (2008) STOC , pp. 113-122
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 18
    • 78650812215 scopus 로고    scopus 로고
    • Short pairing-based non-interactive zero-knowledge arguments
    • M. Abe, editor Springer
    • J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In M. Abe, editor, ASIACRYPT, Volume 6477 of Lecture Notes in Computer Science, pages 321-340. Springer, 2010.
    • (2010) ASIACRYPT, Volume 6477 of Lecture Notes in Computer Science , pp. 321-340
    • Groth, J.1
  • 20
    • 84879827428 scopus 로고    scopus 로고
    • Delegation for bounded space
    • D. Boneh, T. Roughgarden, and J. Feigenbaum, editors ACM
    • Y. T. Kalai, R. Raz, and R. D. Rothblum. Delegation for bounded space. In D. Boneh, T. Roughgarden, and J. Feigenbaum, editors, STOC, pages 565-574. ACM, 2013.
    • (2013) STOC , pp. 565-574
    • Kalai, Y.T.1    Raz, R.2    Rothblum, R.D.3
  • 21
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments (extended abstract)
    • S. R. Kosaraju, M. Fellows, A. Wigderson, and J. A. Ellis, editors ACM
    • J. Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In S. R. Kosaraju, M. Fellows, A. Wigderson, and J. A. Ellis, editors, STOC, pages 723-732. ACM, 1992.
    • (1992) STOC , pp. 723-732
    • Kilian, J.1
  • 22
    • 84873326525 scopus 로고    scopus 로고
    • Competing provers protocols for circuit evaluation
    • R. D. Kleinberg, editor ACM
    • G. Kol and R. Raz. Competing provers protocols for circuit evaluation. In R. D. Kleinberg, editor, ITCS, pages 473-484. ACM, 2013.
    • (2013) ITCS , pp. 473-484
    • Kol, G.1    Raz, R.2
  • 23
    • 84858312040 scopus 로고    scopus 로고
    • Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
    • R. Cramer, editor Springer
    • H. Lipmaa. Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In R. Cramer, editor, TCC, Volume 7194 of Lecture Notes in Computer Science, pages 169-189. Springer, 2012.
    • (2012) TCC, Volume 7194 of Lecture Notes in Computer Science , pp. 169-189
    • Lipmaa, H.1
  • 24
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • S. Micali. Computationally sound proofs. SIAM J. Comput., 30(4): 1253-1298, 2000.
    • (2000) SIAM J. Comput. , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 25
    • 4243054954 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudo-random functions. J. ACM, 51(2): 231-262, 2004.
    • (2004) J. ACM , vol.51 , Issue.2 , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 26
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • R. Cramer, editor Springer
    • B. Parno, M. Raykova, and V. Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In R. Cramer, editor, TCC, Volume 7194 of Lecture Notes in Computer Science, pages 422-439. Springer, 2012.
    • (2012) TCC, Volume 7194 of Lecture Notes in Computer Science , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 27
    • 0026932814 scopus 로고
    • On threshold circuits and polynomial computation
    • J. H. Reif and S. R. Tate. On threshold circuits and polynomial computation. SIAM J. Comput., 21(5): 896-908, 1992.
    • (1992) SIAM J. Comput. , vol.21 , Issue.5 , pp. 896-908
    • Reif, J.H.1    Tate, S.R.2
  • 28
    • 84879820967 scopus 로고    scopus 로고
    • Interactive proofs of proximity: Delegating computation in sublinear time
    • D. Boneh, T. Roughgarden, and J. Feigenbaum, editors ACM
    • G. N. Rothblum, S. P. Vadhan, and A. Wigderson. Interactive proofs of proximity: delegating computation in sublinear time. In D. Boneh, T. Roughgarden, and J. Feigenbaum, editors, STOC, pages 793-802. ACM, 2013.
    • (2013) STOC , pp. 793-802
    • Rothblum, G.N.1    Vadhan, S.P.2    Wigderson, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.