Verifying Computations with Streaming Interactive Proofs
暂无分享,去创建一个
Graham Cormode | Ke Yi | Justin Thaler | Graham Cormode | J. Thaler | K. Yi
[1] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[2] Feifei Li,et al. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams , 2007, VLDB.
[3] Yin Yang,et al. Continuous authentication on relational streams , 2009, The VLDB Journal.
[4] Graham Cormode,et al. An improved data stream summary: the count-min sketch and its applications , 2004, J. Algorithms.
[5] Andrew J. Blumberg. Toward Practical and Unconditional Verification of Remote Computations , 2011, HotOS.
[6] Carsten Lund,et al. Interactive Proof Systems and Alternating Time-Space Complexity , 1991, STACS.
[7] Richard J. Lipton,et al. Best-order streaming model , 2009, Theor. Comput. Sci..
[8] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[9] A. Razborov. Communication Complexity , 2011 .
[10] Sanjeev Arora,et al. Probabilistic checking of proofs: a new characterization of NP , 1998, JACM.
[11] Feifei Li,et al. Small synopses for group-by query verification on outsourced data streams , 2009, TODS.
[12] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[13] Joe Kilian,et al. A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.
[14] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[15] Noga Alon,et al. The space complexity of approximating the frequency moments , 1996, STOC '96.
[16] László Babai,et al. Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..
[17] Eli Ben-Sasson,et al. Short PCPs verifiable in polylogarithmic time , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[18] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[19] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[20] S. Muthukrishnan,et al. Data streams: algorithms and applications , 2005, SODA '03.
[21] Shafi Goldwasser,et al. Private coins versus public coins in interactive proof systems , 1986, STOC '86.
[22] Jacob T. Schwartz,et al. Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.
[23] Sanjeev Arora,et al. Computational Complexity: A Modern Approach , 2009 .
[24] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[25] Adi Shamir,et al. IP = PSPACE , 1992, JACM.
[26] F. P.. Secrecy , 1994, RES: Anthropology and Aesthetics.
[27] Yin Yang,et al. Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.