메뉴 건너뛰기




Volumn , Issue , 2012, Pages 253-268

Taking proof-based verified computation a few steps closer to practicality

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL ARITHMETIC; FOOD ADDITIVES;

EID: 85076228457     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (137)

References (52)
  • 1
    • 85080588018 scopus 로고    scopus 로고
    • CUDA (http://developer.nvidia.com/what-cuda).
  • 2
    • 85080597962 scopus 로고    scopus 로고
    • Open MPI
    • Open MPI (http://www.open-mpi.org).
  • 4
    • 78650270049 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • B. Applebaum, Y. Ishai, and E. Kushilevitz. From secrecy to soundness: efficient verification via secure computation. In ICALP, 2010.
    • (2010) ICALP
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 5
    • 0032058198 scopus 로고    scopus 로고
    • Proof verification and the hardness of approximation problems
    • May
    • S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. J. of the ACM, 45(3):501–555, May 1998.
    • (1998) J. Of the ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 6
    • 0031651077 scopus 로고    scopus 로고
    • Probabilistic checking of proofs: A new characterization of NP
    • Jan
    • S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. J. of the ACM, 45(1):70–122, Jan. 1998.
    • (1998) J. Of the ACM , vol.45 , Issue.1 , pp. 70-122
    • Arora, S.1    Safra, S.2
  • 9
    • 0027308413 scopus 로고
    • Efficient probabilistically checkable proofs and applications to approximations
    • M. Bellare, S. Goldwasser, C. Lund, and A. Russell. Efficient probabilistically checkable proofs and applications to approximations. In STOC, 1993.
    • (1993) STOC
    • Bellare, M.1    Goldwasser, S.2    Lund, C.3    Russell, A.4
  • 10
    • 84898945449 scopus 로고
    • Multi-prover interactive proofs: How to remove intractability assumptions
    • M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: how to remove intractability assumptions. In STOC, 1988.
    • (1988) STOC
    • Ben-Or, M.1    Goldwasser, S.2    Kilian, J.3    Wigderson, A.4
  • 11
    • 84862621790 scopus 로고    scopus 로고
    • Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
    • Feb
    • E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. Fast reductions from RAMs to delegatable succinct constraint satisfaction problems. Feb. 2012. Cryptology eprint 071.
    • (2012) Cryptology Eprint 071
    • Ben-Sasson, E.1    Chiesa, A.2    Genkin, D.3    Tromer, E.4
  • 12
    • 84942522505 scopus 로고    scopus 로고
    • On the concrete-efficiency threshold of probabilistically-checkable proofs
    • Apr
    • E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. On the concrete-efficiency threshold of probabilistically-checkable proofs. ECCC, (045), Apr. 2012.
    • (2012) ECCC , Issue.45
    • Ben-Sasson, E.1    Chiesa, A.2    Genkin, D.3    Tromer, E.4
  • 13
    • 34547829716 scopus 로고    scopus 로고
    • Robust PCPs of proximity, shorter PCPs and applications to coding
    • Dec
    • E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan. Robust PCPs of proximity, shorter PCPs and applications to coding. SIAM J. on Comp., 36(4):889–974, Dec. 2006.
    • (2006) SIAM J. On Comp. , vol.36 , Issue.4 , pp. 889-974
    • Ben-Sasson, E.1    Goldreich, O.2    Harsha, P.3    Sudan, M.4    Vadhan, S.5
  • 14
    • 55249095082 scopus 로고    scopus 로고
    • Short PCPs with polylog query complexity
    • May
    • E. Ben-Sasson and M. Sudan. Short PCPs with polylog query complexity. SIAM J. on Comp., 38(2):551–607, May 2008.
    • (2008) SIAM J. On Comp. , vol.38 , Issue.2 , pp. 551-607
    • Ben-Sasson, E.1    Sudan, M.2
  • 15
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • M. Blum and S. Kannan. Designing programs that check their work. J. of the ACM, 42(1):269–291, 1995.
    • (1995) J. Of the ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 16
    • 0000619172 scopus 로고
    • Self-testing/correcting with applications to numerical problems
    • Dec
    • M. Blum, M. Luby, and R. Rubinfeld. Self-testing/correcting with applications to numerical problems. J. of Comp. and Sys. Sciences, 47(3):549–595, Dec. 1993.
    • (1993) J. Of Comp. Of Sys. Sciences , vol.47 , Issue.3 , pp. 549-595
    • Blum, M.1    Luby, M.2    Rubinfeld, R.3
  • 17
    • 82955182557 scopus 로고    scopus 로고
    • Homomorphic signatures for polynomial functions
    • D. Boneh and D. M. Freeman. Homomorphic signatures for polynomial functions. In EUROCRYPT, 2011.
    • (2011) EUROCRYPT
    • Boneh, D.1    Freeman, D.M.2
  • 18
    • 33745165088 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • D. Boneh, E. J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In TCC, 2005.
    • (2005) TCC
    • Boneh, D.1    Goh, E.J.2    Nissim, K.3
  • 20
    • 80755127640 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • K.-M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 21
    • 84856468957 scopus 로고    scopus 로고
    • Practical verified computation with streaming interactive proofs
    • G. Cormode, M. Mitzenmacher, and J. Thaler. Practical verified computation with streaming interactive proofs. In ITCS, 2012.
    • (2012) ITCS
    • Cormode, G.1    Mitzenmacher, M.2    Thaler, J.3
  • 22
    • 34250354807 scopus 로고    scopus 로고
    • The PCP theorem by gap amplification
    • June
    • I. Dinur. The PCP theorem by gap amplification. J. of the ACM, 54(3), June 2007.
    • (2007) J. Of the ACM , vol.54 , Issue.3
    • Dinur, I.1
  • 23
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469–472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 24
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 25
  • 26
    • 84873362452 scopus 로고    scopus 로고
    • Fully homomorphic message authenticators
    • May
    • R. Gennaro and D. Wichs. Fully homomorphic message authenticators. May 2012. Cryptology eprint 290.
    • (2012) Cryptology Eprint , vol.290
    • Gennaro, R.1    Wichs, D.2
  • 28
    • 84865663852 scopus 로고    scopus 로고
    • Homomorphic evaluation of the AES circuit
    • C. Gentry, S. Halevi, and N. Smart. Homomorphic evaluation of the AES circuit. In CRYPTO, 2012.
    • (2012) CRYPTO
    • Gentry, C.1    Halevi, S.2    Smart, N.3
  • 29
    • 0026122066 scopus 로고
    • What every computer scientist should know about floating-point arithmetic
    • Mar
    • D. Goldberg. What every computer scientist should know about floating-point arithmetic. ACM Computing Surveys, 23(1):5–48, Mar. 1991.
    • (1991) ACM Computing Surveys , vol.23 , Issue.1 , pp. 5-48
    • Goldberg, D.1
  • 31
    • 57049095424 scopus 로고    scopus 로고
    • Delegating computation: Interactive proofs for muggles
    • S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: Interactive proofs for muggles. In STOC, 2008.
    • (2008) STOC
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 32
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. on Comp., 18(1):186–208, 1989.
    • (1989) SIAM J. On Comp. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 33
    • 85051027713 scopus 로고    scopus 로고
    • Linear algebra with sub-linear zero-knowledge arguments
    • J. Groth. Linear algebra with sub-linear zero-knowledge arguments. In CRYPTO, 2009.
    • (2009) CRYPTO
    • Groth, J.1
  • 34
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure two-party computation using garbled circuits. In USENIX Security, 2011.
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 36
    • 85076614343 scopus 로고    scopus 로고
    • SSLShader: Cheap SSL acceleration with commodity processors
    • K. Jang, S. Han, S. Han, S. Moon, and K. Park. SSLShader: Cheap SSL acceleration with commodity processors. In NSDI, 2011.
    • (2011) NSDI
    • Jang, K.1    Han, S.2    Han, S.3    Moon, S.4    Park, K.5
  • 37
    • 84881243280 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments (extended abstract)
    • J. Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In STOC, 1992.
    • (1992) STOC
    • Kilian, J.1
  • 38
    • 0344407518 scopus 로고
    • Improved efficient arguments (preliminary version)
    • J. Kilian. Improved efficient arguments (preliminary version). In CRYPTO, 1995.
    • (1995) CRYPTO
    • Kilian, J.1
  • 40
    • 0002586876 scopus 로고
    • Digital signature based on a conventional encryption function
    • R. C. Merkle. Digital signature based on a conventional encryption function. In CRYPTO, 1987.
    • (1987) CRYPTO
    • Merkle, R.C.1
  • 41
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • S. Micali. Computationally sound proofs. SIAM J. on Comp., 30(4):1253–1298, 2000.
    • (2000) SIAM J. On Comp. , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 43
    • 0027929411 scopus 로고
    • Nearly-linear size holographic proofs
    • A. Polishchuk and D. A. Spielman. Nearly-linear size holographic proofs. In STOC, 1994.
    • (1994) STOC
    • Polishchuk, A.1    Spielman, D.A.2
  • 44
    • 85092637329 scopus 로고    scopus 로고
    • Toward practical and unconditional verification of remote computations
    • S. Setty, A. J. Blumberg, and M. Walfish. Toward practical and unconditional verification of remote computations. In HotOS, 2011.
    • (2011) HotOS
    • Setty, S.1    Blumberg, A.J.2    Walfish, M.3
  • 45
    • 85180792160 scopus 로고    scopus 로고
    • Making argument systems for outsourced computation practical (sometimes)
    • S. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In NDSS, 2012.
    • (2012) NDSS
    • Setty, S.1    McPherson, R.2    Blumberg, A.J.3    Walfish, M.4
  • 47
  • 49
    • 85088779599 scopus 로고    scopus 로고
    • Verifiable computation with massively parallel interactive proofs
    • June Full paper at Feb. 2012
    • J. Thaler, M. Roberts, M. Mitzenmacher, and H. Pfister. Verifiable computation with massively parallel interactive proofs. In USENIX HotCloud Workshop, June 2012. Full paper at http://arxiv.org/abs/1202.1350, Feb. 2012.
    • (2012) USENIX HotCloud Workshop
    • Thaler, J.1    Roberts, M.2    Mitzenmacher, M.3    Pfister, H.4
  • 52
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.