<--- Back to Details
First PageDocument Content
Complexity classes / Cryptography / Control flow / Eval / Computing / Verifiable secret sharing / Verifiable random function / Digital signature / NP / NC
Date: 2018-08-21 23:38:12
Complexity classes
Cryptography
Control flow
Eval
Computing
Verifiable secret sharing
Verifiable random function
Digital signature
NP
NC

Verifiable Delay Functions Dan Boneh1 , Joseph Bonneau2 , Benedikt B¨ unz1 , and Ben Fisch1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 434,75 KB

Share Document on Facebook

Similar Documents

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Lecture 25, Thurs April 20: Hamiltonians Now we’ll move on to our second-to-last unit… Hamiltonians and the Adiabatic Algorithm We’ve seen how it’s an open question whether quantum computers can solve ​NP​-co

Lecture 25, Thurs April 20: Hamiltonians Now we’ll move on to our second-to-last unit… Hamiltonians and the Adiabatic Algorithm We’ve seen how it’s an open question whether quantum computers can solve ​NP​-co

DocID: 1xTKi - View Document

PDF Document

DocID: 1xSVG - View Document

PDF Document

DocID: 1xSM6 - View Document

PDF Document

DocID: 1xSJs - View Document