How to delegate computations

From MaRDI portal
Publication:5259584

DOI10.1145/2591796.2591809zbMath1315.68135OpenAlexW2023675273MaRDI QIDQ5259584

Ron D. Rothblum, Yael Tauman Kalai, Ran Raz

Publication date: 26 June 2015

Published in: Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2591796.2591809




Related Items (39)

Incompressible functions, relative-error extractors, and the power of nondeterministic reductionsA Hierarchy Theorem for Interactive Proofs of Proximity3-Message Zero Knowledge Against Human IgnoranceDelegating RAM Computations with Adaptive Soundness and PrivacyInteractive Oracle ProofsAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseDelegating RAM ComputationsBridging the gap between general probabilistic theories and the device-independent framework for nonlocality and contextualitySingle-server private information retrieval with sublinear amortized timeSNARGs for P from sub-exponential DDH and QRIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsSecure and efficient outsourcing computation on large-scale linear regressionsIncrementally verifiable computation via incremental PCPsBelief-invariant and quantum equilibria in games of incomplete informationVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeNon-interactive publicly-verifiable delegation of committed programsBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsParallelizable delegation from LWENon-interactive universal argumentsSNARGs for monotone policy batch NPPublic-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hashThe hunting of the SNARKCorrelation intractability and SNARGs from sub-exponential DDHQuantum cryptography beyond quantum key distributionSomewhere statistical soundness, post-quantum security, and SNARGsFully-succinct publicly verifiable delegation from constant-size assumptionsNo-signaling linear PCPsUnnamed ItemNo-signaling linear PCPsRational SumchecksWitness indistinguishability for any single-round argument with applications to access controlUnnamed ItemUnnamed ItemOn the Existence of Extractable One-Way FunctionsSpooky Encryption and Its ApplicationsSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsConstant-Round Interactive Proofs for Delegating ComputationRound-optimal black-box commit-and-prove with succinct communicationDelegation with updatable unambiguous proofs and PPAD-hardness


Uses Software


Cites Work


This page was built for publication: How to delegate computations