scientific article

From MaRDI portal
Publication:3549691

zbMath1231.68135MaRDI QIDQ3549691

Yael Tauman Kalai, Shafi Goldwasser, Guy N. Rothblum

Publication date: 5 January 2009


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (65)

Sumcheck arguments and their applicationsUpdateable Inner Product Argument with Logarithmic Verifier and ApplicationsSuccinct non-interactive arguments via linear interactive proofsFine-grained secure computationA Hierarchy Theorem for Interactive Proofs of ProximityProofs of proximity for context-free languages and read-once branching programsInteractive Oracle ProofsMPC-in-multi-heads: a multi-prover zero-knowledge proof system (or: how to jointly prove any NP statements in ZK)A simple post-quantum non-interactive zero-knowledge proof from garbled circuitsEfficient proof composition for verifiable computationRefereed delegation of computationBatch verifiable computation of outsourced functionsSNARGs and PPAD hardness from the decisional Diffie-Hellman assumptionUnnamed ItemLigero: lightweight sublinear arguments without a trusted setupRinocchio: SNARKs for ring arithmeticMulti-key Homomorphic AuthenticatorsEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsNon-interactive zero-knowledge proofs to multiple verifiersBrakedown: linear-time and field-agnostic SNARKs for R1CSMultikey Fully Homomorphic Encryption and ApplicationsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsOrion: zero knowledge proof with linear prover timeVector commitments over rings and compressed \(\varSigma \)-protocolsScalable and transparent proofs over all large fields, via elliptic curves. ECFFT. IIOne-time programs from commodity hardwareThe hunting of the SNARKSomewhere statistical soundness, post-quantum security, and SNARGsFully-succinct publicly verifiable delegation from constant-size assumptionsPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudFast and Deterministic Constant Factor Approximation Algorithms for LCS Imply New Circuit Lower BoundsQuantum homomorphic encryption scheme with flexible number of evaluator based on \((k, n)\)-threshold quantum state sharingEfficient algorithms for secure outsourcing of bilinear pairingsFast Reed-Solomon Interactive Oracle Proofs of ProximityAlgebraic (trapdoor) one-way functions: constructions and applicationsTrusted computing with addition machines. IIEfficient computation outsourcing for inverting a class of homomorphic functionsPractical homomorphic message authenticators for arithmetic circuitsVerification protocols with sub-linear communication for polynomial matrix operationsMeasurement-Based and Universal Blind Quantum ComputationBest-order streaming modelUnnamed ItemPrivacy-preserving verifiable delegation of polynomial and matrix functionsNo-signaling linear PCPsElimination-based certificates for triangular equivalence and rank profilesRational SumchecksInteractive Coding for Interactive ProofsMulti-server verifiable delegation of computations: unconditional security and practical efficiencyBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsTransparent SNARKs from DARK compilersWitness indistinguishability for any single-round argument with applications to access controlBoosting verifiable computation on encrypted dataUnnamed ItemProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsFlexible and efficient verifiable computation on encrypted dataSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsVerifiable Stream Computation and Arthur--Merlin CommunicationOutsourcing computation: the minimal refereed mechanismConstant-Round Interactive Proofs for Delegating ComputationVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsFiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFsSpartan: efficient and general-purpose zkSNARKs without trusted setupArthur-Merlin streaming complexityComputational Integrity with a Public Random String from Quasi-Linear PCPs




This page was built for publication: