Proximity Gaps for Reed–Solomon Codes
暂无分享,去创建一个
Yuval Ishai | Eli Ben-Sasson | Shubhangi Saraf | Dan Carmon | Swastik Kopparty | Swastik Kopparty | Y. Ishai | Dan Carmon | Shubhangi Saraf | Eli Ben-Sasson
[1] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[2] Eli Ben-Sasson,et al. Linear-Size Constant-Query IOPs for Delegating Computation , 2019, IACR Cryptol. ePrint Arch..
[3] Erich Kaltofen,et al. Effective Noether irreducibility forms and applications , 1991, STOC '91.
[4] Ignacio Cascudo,et al. Rate-1, Linear Time and Additively Homomorphic UC Commitments , 2016, CRYPTO.
[5] Madhu Sudan,et al. Improved Low-Degree Testing and its Applications , 1997, STOC '97.
[6] Eli Ben-Sasson,et al. Interactive Oracle Proofs , 2016, TCC.
[7] Daniel A. Spielman,et al. Nearly-linear size holographic proofs , 1994, STOC '94.
[8] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[9] Guy N. Rothblum,et al. Constant-Round Interactive Proofs for Delegating Computation , 2016, Electron. Colloquium Comput. Complex..
[10] Yuval Ishai,et al. Scalable Secure Multiparty Computation , 2006, CRYPTO.
[11] Eli Ben-Sasson,et al. Scalable Zero Knowledge with No Trusted Setup , 2019, CRYPTO.
[12] Eli Ben-Sasson,et al. Worst-Case to Average Case Reductions for the Distance to a Code , 2018, CCC.
[13] Eli Ben-Sasson,et al. Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..
[14] Erich Kaltofen. Effective Noether irreducibility forms and applications , 1991, STOC '91.
[15] Rafail Ostrovsky,et al. Zero-Knowledge Proofs from Secure Multiparty Computation , 2009, SIAM J. Comput..
[16] Peter Manohar,et al. Succinct Arguments in the Quantum Random Oracle Model , 2019, IACR Cryptol. ePrint Arch..
[17] Erich Kaltofen,et al. Polynomial-Time Reductions from Multivariate to Bi- and Univariate Integral Polynomial Factorization , 1985, SIAM J. Comput..
[18] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[19] R. Lathe. Phd by thesis , 1988, Nature.
[20] D. Spielman,et al. Computationally efficient error-correcting codes and holographic proofs , 1995 .
[21] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[22] Eli Ben-Sasson,et al. DEEP-FRI: Sampling outside the box improves soundness , 2019, IACR Cryptol. ePrint Arch..
[23] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[24] I. G. BONNER CLAPPISON. Editor , 1960, The Electric Power Engineering Handbook - Five Volume Set.
[25] Eli Ben-Sasson,et al. Fast Reed-Solomon Interactive Oracle Proofs of Proximity , 2017, Electron. Colloquium Comput. Complex..
[26] Yuval Ishai,et al. Secure Arithmetic Computation with No Honest Majority , 2008, IACR Cryptol. ePrint Arch..
[27] Yuval Ishai,et al. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup , 2017, Designs, Codes and Cryptography.
[28] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[29] Yuval Ishai,et al. Adaptive versus Non-Adaptive Security of Multi-Party Protocols , 2004, Journal of Cryptology.
[30] L. Goddard. Information Theory , 1962, Nature.
[31] Yuval Ishai,et al. LevioSA: Lightweight Secure Arithmetic Computation , 2019, CCS.
[32] V. Rich. Personal communication , 1989, Nature.
[33] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[34] D. Boneh,et al. Interactive proofs of proximity: delegating computation in sublinear time , 2013, STOC '13.
[35] Nicholas Spooner,et al. Fractal: Post-Quantum and Transparent Recursive Proofs from Holography , 2020, IACR Cryptol. ePrint Arch..
[36] Pierre McKenzie,et al. Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing , 2017, STOC.
[37] Eli Ben-Sasson,et al. Aurora: Transparent Succinct Arguments for R1CS , 2019, IACR Cryptol. ePrint Arch..