![Cryptography / Computational complexity theory / Complexity classes / Public-key cryptography / Interactive proof system / NP / NEXPTIME / IP / Probabilistically checkable proof / Commitment scheme / Proof of secure erasure / Randomized algorithm Cryptography / Computational complexity theory / Complexity classes / Public-key cryptography / Interactive proof system / NP / NEXPTIME / IP / Probabilistically checkable proof / Commitment scheme / Proof of secure erasure / Randomized algorithm](https://www.pdfsearch.io/img/e0225e8e7d1314c28e737761e3239890.jpg) Date: 2017-11-11 14:59:54Cryptography Computational complexity theory Complexity classes Public-key cryptography Interactive proof system NP NEXPTIME IP Probabilistically checkable proof Commitment scheme Proof of secure erasure Randomized algorithm | | Toward practical and unconditional verification of remote computations Srinath Setty∗, Andrew J. Blumberg∗, and Michael Walfish∗ 1 IntroductionAdd to Reading ListSource URL: www.pepper-project.orgDownload Document from Source Website File Size: 151,71 KBShare Document on Facebook
|