메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Toward practical and unconditional verification of remote computations

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85092637329     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (42)

References (32)
  • 2
    • 0037995929 scopus 로고    scopus 로고
    • SETI@home: An experiment in public-resource computing
    • Nov
    • D. P. Anderson et al. SETI@home: An experiment in public-resource computing. CACM, 45(11):56-61, Nov. 2002.
    • (2002) CACM , vol.45 , Issue.11 , pp. 56-61
    • Anderson, D. P.1
  • 3
    • 0032058198 scopus 로고    scopus 로고
    • Proof verification and the hardness of approximation problems
    • May
    • S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. Journal of the ACM, 45(3):501-555, May 1998.
    • (1998) Journal of the ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 4
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • M. J. Atallah and K. B. Frikken. Securely outsourcing linear algebra computations. In ASIACCS, 2010.
    • (2010) ASIACCS
    • Atallah, M. J.1    Frikken, K. B.2
  • 6
    • 48949100471 scopus 로고    scopus 로고
    • Improved neighborhood-based collaborative filtering
    • R. M. Bell and Y. Koren. Improved neighborhood-based collaborative filtering. In KDD Cup and Workshop, 2007.
    • (2007) KDD Cup and Workshop
    • Bell, R. M.1    Koren, Y.2
  • 8
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • M. Blum and S. Kannan. Designing programs that check their work. Journal of the ACM, 42(1):269-291, 1995.
    • (1995) Journal of the ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 9
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM TOCS, 20(4):398-461, 2002.
    • (2002) ACM TOCS , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 10
    • 84856435337 scopus 로고    scopus 로고
    • Proof-carrying data and hearsay arguments from signature cards
    • A. Chiesa and E. Tromer. Proof-carrying data and hearsay arguments from signature cards. In ICS, 2010.
    • (2010) ICS
    • Chiesa, A.1    Tromer, E.2
  • 11
    • 84893475005 scopus 로고    scopus 로고
    • Augmented smart phone applications through clone cloud execution
    • B.-G. Chun and P. Maniatis. Augmented smart phone applications through clone cloud execution. In HotOS, 2009.
    • (2009) HotOS
    • Chun, B.-G.1    Maniatis, P.2
  • 12
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
    • (2010) CRYPTO
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 13
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
    • (2009) STOC
    • Gentry, C.1
  • 14
    • 57049095424 scopus 로고    scopus 로고
    • Delegating computation: Interactive proofs for muggles
    • S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: Interactive proofs for muggles. In STOC, 2008.
    • (2008) STOC
    • Goldwasser, S.1    Kalai, Y. T.2    Rothblum, G. N.3
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Comp., 18(1):186-208, 1989.
    • (1989) SIAM Journal on Comp , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 85051027713 scopus 로고    scopus 로고
    • Linear algebra with sub-linear zero-knowledge arguments
    • J. Groth. Linear algebra with sub-linear zero-knowledge arguments. In CRYPTO, 2009.
    • (2009) CRYPTO
    • Groth, J.1
  • 17
    • 58049120018 scopus 로고    scopus 로고
    • PeerReview: Practical accountability for distributed systems
    • A. Haeberlen, P. Kouznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In SOSP, 2007.
    • (2007) SOSP
    • Haeberlen, A.1    Kouznetsov, P.2    Druschel, P.3
  • 19
    • 0344407518 scopus 로고
    • Improved efficient arguments (preliminary version)
    • J. Kilian. Improved efficient arguments (preliminary version). In CRYPTO, 1995.
    • (1995) CRYPTO
    • Kilian, J.1
  • 22
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • S. Micali. Computationally sound proofs. SIAM Journal on Comp., 30(4):1253-1298, 2000.
    • (2000) SIAM Journal on Comp , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 23
    • 79959671737 scopus 로고    scopus 로고
    • Ensuring content integrity for untrusted peer-to-peer content distribution networks
    • N. Michalakis, R. Soulè, and R. Grimm. Ensuring content integrity for untrusted peer-to-peer content distribution networks. In NSDI, 2007.
    • (2007) NSDI
    • Michalakis, N.1    Soulè, R.2    Grimm, R.3
  • 24
    • 0006839339 scopus 로고    scopus 로고
    • Distributed execution with remote audit
    • F. Monrose, P. Wycko, and A. D. Rubin. Distributed execution with remote audit. In NDSS, 1999.
    • (1999) NDSS
    • Monrose, F.1    Wycko, P.2    Rubin, A. D.3
  • 26
    • 79951998286 scopus 로고    scopus 로고
    • Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency
    • A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In TRUST, 2010.
    • (2010) TRUST
    • Sadeghi, A.-R.1    Schneider, T.2    Winandy, M.3
  • 29
    • 33748537883 scopus 로고    scopus 로고
    • Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In SOSP, 2005.
    • (2005) SOSP
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    van Doorn, L.5    Khosla, P.6
  • 31
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • R. Sion. Query execution assurance for outsourced databases. In VLDB, 2005.
    • (2005) VLDB
    • Sion, R.1
  • 32
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A. C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.