Lower bounds on random-self-reducibility
暂无分享,去创建一个
[1] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[2] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[3] David S. Johnson,et al. Computers and In stractability: A Guide to the Theory of NP-Completeness. W. H Freeman, San Fran , 1979 .
[4] László Babai,et al. Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..
[5] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[6] Martin Tompa,et al. Random self-reducibility and zero knowledge interactive proofs of possession of information , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[7] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[8] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[9] Stathis Zachos,et al. Does co-NP Have Short Interactive Proofs? , 1987, Inf. Process. Lett..
[10] Carsten Lund,et al. Nondeterministic exponential time has two-prover interactive protocols , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[11] Moti Yung,et al. Minimum-Knowledge Interactive Proofs for Decision Problems , 1989, SIAM J. Comput..
[12] Adi Shamir,et al. IP = PSPACE , 1992, JACM.
[13] Chee-Keng Yap,et al. Some Consequences of Non-Uniform Conditions on Uniform Classes , 1983, Theor. Comput. Sci..
[14] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[15] Andrew Chi-Chih Yao,et al. Coherent Functions and Program ( extended abstract ) Checkers , .
[16] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[17] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[18] Manuel Blum,et al. Designing programs that check their work , 1989, STOC '89.
[19] Martín Abadi,et al. On Hiding Information from an Oracle , 1987, Proceeding Structure in Complexity Theory.
[20] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[21] Richard J. Lipton,et al. New Directions In Testing , 1989, Distributed Computing And Cryptography.
[22] László Babai,et al. Random Oracles Separate PSPACE from the Polynomial-Time Hierarchy , 1987, Inf. Process. Lett..
[23] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[24] Jin-Yi Cai,et al. With probability one, a random oracle separates PSPACE from the polynomial-time hierarchy , 1986, STOC '86.
[25] Shafi Goldwasser,et al. Private coins versus public coins in interactive proof systems , 1986, STOC '86.