Making argument systems for outsourced computation practical (sometimes)
暂无分享,去创建一个
Srinath T. V. Setty | Andrew J. Blumberg | Michael Walfish | Richard McPherson | A. Blumberg | Michael Walfish | R. McPherson
[1] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[2] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[3] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[4] Avi Wigderson,et al. Multi-prover interactive proofs: how to remove intractability assumptions , 2019, STOC '88.
[5] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[6] Manuel Blum,et al. Designing programs that check their work , 1989, STOC '89.
[7] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[8] Leonid A. Levin,et al. Checking computations in polylogarithmic time , 1991, STOC '91.
[9] Joe Kilian,et al. A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.
[10] Sanjeev Arora,et al. Probabilistic checking of proofs; a new characterization of NP , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[11] Daniel A. Spielman,et al. Nearly-linear size holographic proofs , 1994, STOC '94.
[12] Mihir Bellare,et al. Linearity testing in characteristic two , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[13] Joe Kilian,et al. Improved Efficient Arguments (Preliminary Version) , 1995, CRYPTO.
[14] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[15] Ronitt Rubinfeld,et al. Approximate checking of polynomials and functional equations , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[16] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[17] Carsten Lund,et al. Proof verification and the hardness of approximation problems , 1998, JACM.
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Fabian Monrose,et al. Distributed Execution with Remote Audit , 1999, NDSS.
[20] Silvio Micali,et al. Computationally Sound Proofs , 2000, SIAM J. Comput..
[21] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.
[22] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[23] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OSDI '02.
[24] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[25] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[26] Eli Ben-Sasson,et al. Robust pcps of proximity, shorter pcps and applications to coding , 2004, STOC '04.
[27] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[28] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[29] Eli Ben-Sasson,et al. Short PCPs verifiable in polylogarithmic time , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[30] Radu Sion,et al. Query Execution Assurance for Outsourced Databases , 2005, VLDB.
[31] Samuel P. Midkiff,et al. Lightweight Monitoring of the Progress of Remotely Executing Computations , 2005, LCPC.
[32] D. Song,et al. Verifying Server Computation , 2005 .
[33] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[34] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[35] Irit Dinur,et al. The PCP theorem by gap amplification , 2006, STOC.
[36] David Mazières,et al. RE: Reliable Email , 2006, NSDI.
[37] Ahmad-Reza Sadeghi,et al. A protocol for property-based attestation , 2006, STC '06.
[38] Joseph M. Hellerstein,et al. Proof Sketches: Verifiable In-Network Aggregation , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[39] Robert Grimm,et al. Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks , 2007, NSDI.
[40] Andreas Haeberlen,et al. PeerReview: practical accountability for distributed systems , 2007, SOSP.
[41] Rafail Ostrovsky,et al. Efficient Arguments without Short PCPs , 2007, Twenty-Second Annual IEEE Conference on Computational Complexity (CCC'07).
[42] Eli Ben-Sasson,et al. Short PCPs with Polylog Query Complexity , 2008, SIAM J. Comput..
[43] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[44] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[45] Stefan Katzenbeisser,et al. Improving the scalability of platform attestation , 2008, STC '08.
[46] Jens Groth,et al. Linear Algebra with Sub-linear Zero-Knowledge Arguments , 2009, CRYPTO.
[47] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[48] Ghassan O. Karame,et al. Secure Remote Execution of Sequential Computations , 2009, ICICS.
[49] Stuart Haber,et al. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases , 2009, Privacy Enhancing Technologies.
[50] A. Sadeghi,et al. Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .
[51] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[52] Eran Tromer,et al. Proof-Carrying Data and Hearsay Arguments from Signature Cards , 2010, ICS.
[53] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[54] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[55] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[56] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[57] Stefan Katzenbeisser,et al. Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation , 2010, TRUST.
[58] Stefan Katzenbeisser,et al. Semantic integrity in large-scale online simulations , 2010, TOIT.
[59] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[60] Andrew J. Blumberg. Toward Practical and Unconditional Verification of Remote Computations , 2011, HotOS.
[61] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[62] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[63] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[64] Cong Wang,et al. Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations , 2011, 2011 31st International Conference on Distributed Computing Systems.
[65] Miguel Vargas-Lombardo,et al. Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC) , 2012 .
[66] Graham Cormode,et al. Practical verified computation with streaming interactive proofs , 2011, ITCS '12.
[67] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.