Compact Multiparty Verification of Simple Computations
暂无分享,去创建一个
[1] Steven Homer,et al. Interactive Proof Systems , 2011 .
[2] Andrew J. Blumberg,et al. Verifying computations without reexecuting them , 2015, Commun. ACM.
[3] Srinath T. V. Setty,et al. Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.
[4] Ignacio Cascudo,et al. SCRAPE: Scalable Randomness Attested by Public Entities , 2017, IACR Cryptol. ePrint Arch..
[5] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[6] Jason Teutsch,et al. A scalable verification solution for blockchains , 2019, ArXiv.
[7] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[8] Florian Glaser,et al. Pervasive Decentralisation of Digital Infrastructures: A Framework for Blockchain enabled System and Use Case Analysis , 2017, HICSS.
[9] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[10] Abhi Shelat,et al. Full Accounting for Verifiable Outsourcing , 2017, CCS.
[11] Kyriakos Mouratidis,et al. Scalable Verification for Outsourced Dynamic Databases , 2009, Proc. VLDB Endow..
[12] Benjamin Braun,et al. Verifying computations with state , 2013, IACR Cryptol. ePrint Arch..
[13] Martin Elsman,et al. Certified Compilation of Financial Contracts , 2018, PPDP.
[14] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[15] Roberto J. Bayardo,et al. Merkle tree authentication of HTTP responses , 2005, WWW '05.
[16] Oded Goldreich,et al. Probabilistic Proof Systems: A Primer , 2008, Found. Trends Theor. Comput. Sci..
[17] Alistair A. Young,et al. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 2017, MICCAI 2017.
[18] Silvio Micali,et al. CS Proofs (Extended Abstracts) , 1994, FOCS 1994.
[19] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[20] Benjamin Braun,et al. Resolving the conflict between generality and plausibility in verified computation , 2013, EuroSys '13.
[21] Jason Bennett Thatcher,et al. Blockchain Technology in Business and Information Systems Research , 2017, Business & Information Systems Engineering.
[22] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[23] Martin Elsman,et al. Futhark: purely functional GPU-programming with nested parallelism and in-place array updates , 2017, PLDI.
[24] Xavier Leroy,et al. The CompCert C verified compiler: Documentation and user’s manual , 2015 .
[25] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[26] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[27] Grigore Rosu,et al. IELE: An Intermediate-Level Blockchain Language Designed and Implemented Using Formal Semantics , 2018 .
[28] Grigore Rosu,et al. A Language-Independent Approach to Smart Contract Verification , 2018, ISoLA.
[29] Jason Teutsch,et al. Demystifying Incentives in the Consensus Computer , 2015, CCS.
[30] Sanjay Jain,et al. How to verify computation with a rational network , 2016, ArXiv.
[31] Robin Teigland,et al. Jumping on the Blockchain Bandwagon: Lessons of the Past and Outlook to the Future , 2016, ICIS.
[32] Emin Gün Sirer,et al. Enabling Strong Database Integrity using Trusted Execution Environments , 2018, ArXiv.
[33] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[34] Karim R. Lakhani,et al. Community, Joining, and Specialization in Open Source Software Innovation: A Case Study , 2003 .
[35] Martin Fowler,et al. Domain-Specific Languages , 2010, The Addison-Wesley signature series.