메뉴 건너뛰기




Volumn , Issue , 2014, Pages 765-780

TRUESET: Faster verifiable set computations

Author keywords

[No Author keywords available]

Indexed keywords

OPEN SYSTEMS; POLYNOMIAL APPROXIMATION;

EID: 85076320533     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (48)

References (29)
  • 1
    • 84889045277 scopus 로고    scopus 로고
    • Verifiable delegation of computation on outsourced data
    • M. Backes, D. Fiore, and R. M. Reischuk. Verifiable delegation of computation on outsourced data. In CCS, pages 863-874, 2013.
    • (2013) CCS , pp. 863-874
    • Backes, M.1    Fiore, D.2    Reischuk, R.M.3
  • 2
    • 84884473761 scopus 로고    scopus 로고
    • SNARKs for C: Verifying program executions succinctly and in zero knowledge
    • E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In CRYPTO (2), pages 90-108, 2013.
    • (2013) CRYPTO (2) , pp. 90-108
    • Ben-Sasson, E.1    Chiesa, A.2    Genkin, D.3    Tromer, E.4    Virza, M.5
  • 5
    • 84856494511 scopus 로고    scopus 로고
    • From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
    • N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In ITCS, pages 326-349, 2012.
    • (2012) ITCS , pp. 326-349
    • Bitansky, N.1    Canetti, R.2    Chiesa, A.3    Tromer, E.4
  • 6
    • 84879803522 scopus 로고    scopus 로고
    • Recursive composition and bootstrapping for SNARKS and proof-carrying data
    • N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer. Recursive composition and bootstrapping for SNARKS and proof-carrying data. In STOC, pages 111-120, 2013.
    • (2013) STOC , pp. 111-120
    • Bitansky, N.1    Canetti, R.2    Chiesa, A.3    Tromer, E.4
  • 7
    • 84873941196 scopus 로고    scopus 로고
    • Succinct non-interactive arguments via linear interactive proofs
    • N. Bitansky, A. Chiesa, Y. Ishai, R. Ostrovsky, and O. Paneth. Succinct non-interactive arguments via linear interactive proofs. In TCC, pages 315-333, 2013.
    • (2013) TCC , pp. 315-333
    • Bitansky, N.1    Chiesa, A.2    Ishai, Y.3    Ostrovsky, R.4    Paneth, O.5
  • 8
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • D. Boneh and X. Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptology, 21(2), pages 149-177, 2008.
    • (2008) J. Cryptology , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 10
    • 84958530489 scopus 로고    scopus 로고
    • Verifiable set operations over outsourced databases
    • R. Canetti, O. Paneth, D. Papadopoulos, and N. Triandopoulos. Verifiable set operations over outsourced databases. In PKC, pages 113-130, 2014.
    • (2014) PKC , pp. 113-130
    • Canetti, R.1    Paneth, O.2    Papadopoulos, D.3    Triandopoulos, N.4
  • 12
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homo-morphic encryption
    • K.-M. Chung, Y. T. Kalai, and S. P. Vadhan. Improved delegation of computation using fully homo-morphic encryption. In CRYPTO, pages 483-501, 2010.
    • (2010) CRYPTO , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.T.2    Vadhan, S.P.3
  • 13
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, pages 465-482, 2010.
    • (2010) CRYPTO , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 14
    • 84883413063 scopus 로고    scopus 로고
    • Quadratic span programs and succinct NIZKs without PCPs
    • R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct NIZKs without PCPs. In EUROCRYPT, pages 626-645, 2013.
    • (2013) EUROCRYPT , pp. 626-645
    • Gennaro, R.1    Gentry, C.2    Parno, B.3    Raykova, M.4
  • 16
    • 78650812215 scopus 로고    scopus 로고
    • Short pairing-based non-interactive zero-knowledge arguments
    • J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In ASIACRYPT, pages 321-340, 2010.
    • (2010) ASIACRYPT , pp. 321-340
    • Groth, J.1
  • 18
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • L. Kissner and D. X. Song. Privacy-preserving set operations. In CRYPTO, pages 241-257, 2005.
    • (2005) CRYPTO , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 21
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • S. Micali. Computationally sound proofs. SIAM J. Comput., 30(4):1253-1298, 2000.
    • (2000) SIAM J. Comput. , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 22
    • 80051963720 scopus 로고    scopus 로고
    • Optimal verification of operations on dynamic sets
    • C. Papamanthou, R. Tamassia, and N. Triandopoulos. Optimal verification of operations on dynamic sets. In CRYPTO, pages 91-110, 2011.
    • (2011) CRYPTO , pp. 91-110
    • Papamanthou, C.1    Tamassia, R.2    Triandopoulos, N.3
  • 24
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • B. Parno, M. Raykova, and V. Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In TCC, pages 422-439, 2012.
    • (2012) TCC , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 25
    • 84877694382 scopus 로고    scopus 로고
    • Resolving the conflict between generality and plausibility in verified computation
    • S. T. V. Setty, B. Braun, V. Vu, A. J. Blumberg, B. Parno, and M. Walfish. Resolving the conflict between generality and plausibility in verified computation. In EuroSys, pages 71-84, 2013.
    • (2013) EuroSys , pp. 71-84
    • Setty, S.T.V.1    Braun, B.2    Vu, V.3    Blumberg, A.J.4    Parno, B.5    Walfish, M.6
  • 26
    • 85180792160 scopus 로고    scopus 로고
    • Making argument systems for outsourced computation practical (sometimes)
    • S. T. V. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In NDSS, 2012.
    • (2012) NDSS
    • Setty, S.T.V.1    McPherson, R.2    Blumberg, A.J.3    Walfish, M.4
  • 28
    • 0001465210 scopus 로고
    • A new polynomial factorization algorithm and its implementation
    • V. Shoup. A new polynomial factorization algorithm and its implementation. Journal of Symbolic Computation, 20(4), pages 363-397, 1995.
    • (1995) Journal of Symbolic Computation , vol.20 , Issue.4 , pp. 363-397
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.