How to delegate computations
DOI10.1145/2591796.2591809zbMATH Open1315.68135OpenAlexW2023675273MaRDI QIDQ5259584FDOQ5259584
Ron D. Rothblum, Yael Tauman Kalai, Ran Raz
Publication date: 26 June 2015
Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2591796.2591809
Formal languages and automata (68Q45) Data encryption (aspects in computer science) (68P25) Analysis of algorithms and problem complexity (68Q25) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Theory of Cryptography
- The geometry of differential privacy: the small database and approximate cases
- On the geometry of differential privacy
- Interactive privacy via the median mechanism
- The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
- Lower Bounds in Differential Privacy
- Iterative Constructions and Private Data Release
- Differential Privacy and the Fat-Shattering Dimension of Linear Queries
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- On the complexity of differentially private data release
- Collusion-secure fingerprinting for digital data
- Advances in Cryptology โ CRYPTO 2004
- New Efficient Attacks on Statistical Disclosure Control Mechanisms
- Bounds on the Sample Complexity for Private Learning and Private Data Release
- Answering n {2+o(1)} counting queries with differential privacy is hard
- Characterizing the sample complexity of private learners
- Faster Algorithms for Privately Releasing Marginals
- Faster private release of marginals on small databases
- Private Learning and Sanitization: Pure vs. Approximate Differential Privacy
- Privately releasing conjunctions and the statistical query barrier
- Efficient algorithms for privately releasing marginals via convex relaxations
Cited In (48)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Delegation with updatable unambiguous proofs and PPAD-hardness
- On black-box knowledge-sound commit-and-prove SNARKs
- Non-interactive universal arguments
- SNARGs for monotone policy batch NP
- Rational Sumchecks
- No-signaling linear PCPs
- Delegating RAM Computations
- Title not available (Why is that?)
- Parallelizable delegation from LWE
- Locally verifiable distributed SNARGs
- On black-box verifiable outsourcing
- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
- DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES
- Witness indistinguishability for any single-round argument with applications to access control
- Incompressible functions, relative-error extractors, and the power of nondeterministic reductions
- Belief-invariant and quantum equilibria in games of incomplete information
- Round-optimal black-box commit-and-prove with succinct communication
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Bridging the gap between general probabilistic theories and the device-independent framework for nonlocality and contextuality
- Non-interactive publicly-verifiable delegation of committed programs
- Correlation intractability and SNARGs from sub-exponential DDH
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Secure and efficient outsourcing computation on large-scale linear regressions
- Spooky Encryption and Its Applications
- Constant-Round Interactive Proofs for Delegating Computation
- No-signaling linear PCPs
- Single-server private information retrieval with sublinear amortized time
- SNARGs for P from sub-exponential DDH and QR
- Adaptive Succinct Garbled RAM or: How to Delegate Your Database
- Delegating RAM Computations with Adaptive Soundness and Privacy
- Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance
- Incrementally verifiable computation via incremental PCPs
- Quantum cryptography beyond quantum key distribution
- Fully-succinct publicly verifiable delegation from constant-size assumptions
- Boosting batch arguments and RAM delegation
- Quantum advantage from any non-local game
- Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems
- Interactive Oracle Proofs
- Adaptively sound zero-knowledge SNARKs for UP
- The hunting of the SNARK
- Somewhere statistical soundness, post-quantum security, and SNARGs
- A Hierarchy Theorem for Interactive Proofs of Proximity
- On the existence of extractable one-way functions
- 3-Message Zero Knowledge Against Human Ignorance
- Title not available (Why is that?)
- Public-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hash
Uses Software
Recommendations
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs ๐ ๐
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption ๐ ๐
- Distributed Provers with Applications to Undeniable Signatures ๐ ๐
- Constant-round interactive proofs for delegating computation ๐ ๐
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency ๐ ๐
- Constant-Round Interactive Proofs for Delegating Computation ๐ ๐
- How to Delegate Computations: The Power of No-Signaling Proofs ๐ ๐
- Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting ๐ ๐
- DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES ๐ ๐
This page was built for publication: How to delegate computations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5259584)