How to delegate computations
From MaRDI portal
Publication:5259584
Recommendations
- How to Delegate Computations: The Power of No-Signaling Proofs
- DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency
- Constant-round interactive proofs for delegating computation
- Constant-round interactive proofs for delegating computation
- How to delegate and verify in public: verifiable computation from attribute-based encryption
- Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- Distributed Provers with Applications to Undeniable Signatures
Cites work
- scientific article; zbMATH DE number 5485440 (Why is no real title available?)
- scientific article; zbMATH DE number 5485574 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Answering \(n^{2+o(1)}\) counting queries with differential privacy is hard
- Bounds on the sample complexity for private learning and private data release
- Characterizing the sample complexity of private learners
- Collusion-secure fingerprinting for digital data
- Differential privacy and the fat-shattering dimension of linear queries
- Efficient algorithms for privately releasing marginals via convex relaxations
- Faster algorithms for privately releasing marginals
- Faster private release of marginals on small databases
- Interactive privacy via the median mechanism
- Iterative Constructions and Private Data Release
- Lower bounds in differential privacy
- New Efficient Attacks on Statistical Disclosure Control Mechanisms
- On the complexity of differentially private data release, efficient algorithms and hardness results
- On the geometry of differential privacy
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- Private Learning and Sanitization: Pure vs. Approximate Differential Privacy
- The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
- Theory of Cryptography
Cited in
(52)- Public-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hash
- scientific article; zbMATH DE number 7250157 (Why is no real title available?)
- Delegation with updatable unambiguous proofs and PPAD-hardness
- On black-box knowledge-sound commit-and-prove SNARKs
- Non-interactive universal arguments
- SNARGs for monotone policy batch NP
- Delegating RAM Computations
- No-signaling linear PCPs
- scientific article; zbMATH DE number 7250160 (Why is no real title available?)
- Parallelizable delegation from LWE
- Locally verifiable distributed SNARGs
- On black-box verifiable outsourcing
- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
- DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES
- Delegating RAM computations with adaptive soundness and privacy
- Adaptive succinct garbled RAM or: how to delegate your database
- A hierarchy theorem for interactive proofs of proximity
- Witness indistinguishability for any single-round argument with applications to access control
- Incompressible functions, relative-error extractors, and the power of nondeterministic reductions
- Belief-invariant and quantum equilibria in games of incomplete information
- Round-optimal black-box commit-and-prove with succinct communication
- Probabilistic checking against non-signaling strategies from linearity testing
- Bridging the gap between general probabilistic theories and the device-independent framework for nonlocality and contextuality
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Non-interactive publicly-verifiable delegation of committed programs
- Interactive oracle proofs
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Correlation intractability and SNARGs from sub-exponential DDH
- Spooky interaction and its discontents: compilers for succinct two-message argument systems
- Secure and efficient outsourcing computation on large-scale linear regressions
- Spooky Encryption and Its Applications
- Delegation for bounded space
- How to delegate computations publicly
- 3-message zero knowledge against human ignorance
- Single-server private information retrieval with sublinear amortized time
- SNARGs for P from sub-exponential DDH and QR
- No-signaling linear PCPs
- Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance
- Incrementally verifiable computation via incremental PCPs
- Quantum cryptography beyond quantum key distribution
- Constant-round interactive proofs for delegating computation
- Fully-succinct publicly verifiable delegation from constant-size assumptions
- Boosting batch arguments and RAM delegation
- Quantum advantage from any non-local game
- The hunting of the SNARK
- Adaptively sound zero-knowledge SNARKs for UP
- Somewhere statistical soundness, post-quantum security, and SNARGs
- Succinct spooky free compilers are not black box sound
- On the existence of extractable one-way functions
- Rational sumchecks
- scientific article; zbMATH DE number 5485522 (Why is no real title available?)
- Delegating computation: interactive proofs for muggles
This page was built for publication: How to delegate computations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5259584)