Publication | Closed Access
How to delegate computations
110
Citations
22
References
2014
Year
Unknown Venue
EngineeringAdvanced ComputingVerification1-Round Delegation SchemeAutomated ProofComputational ComplexityCryptographic ProtocolFormal VerificationProof ComplexityUnconventional ComputingMechanism DesignSecure Multi-party ComputationData PrivacyPrivate Information RetrievalComputer ScienceArgument SystemData SecurityCryptographyTheory Of ComputingDelegation SchemeAutomated ReasoningFormal Methods
We construct a 1-round delegation scheme (i.e., argument system) for every language computable in time t = t(n), where the running time of the prover is poly(t) and the running time of the verifier is n · polylog(t). In particular, for every language in P we obtain a delegation scheme with almost linear time verification. Our construction relies on the existence of a computational sub-exponentially secure private information retrieval (PIR) scheme.
| Year | Citations | |
|---|---|---|
Page 1
Page 1