Inicio > > Ciencias de la computación > On Doubly-Efficient Interactive Proof Systems
On Doubly-Efficient Interactive Proof Systems

On Doubly-Efficient Interactive Proof Systems

Oded Goldreich

103,26 €
IVA incluido
Disponible
Editorial:
Now Publishers
Año de edición:
2018
Materia
Ciencias de la computación
ISBN:
9781680834246
103,26 €
IVA incluido
Disponible

Selecciona una librería:

  • Donde los libros
  • Librería 7artes
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

An interactive proof system is called doubly-efficient if the prescribed prover strategy can be implemented in polynomial-time and the verifier’s strategy can be implemented in almost-linear time. Such proof systems make the benefits of interactive proof system available to real-life agents who are restricted to polynomial-time computation. On Doubly-Efficient Interactive Proof Systems surveys some of the known results regarding doubly-efficient interactive proof systems. It starts by presenting two simple constructions for t-no-CLIQUE, where the first construction offers the benefit of being generalized to any “locally characterizable” set, and the second construction offers the benefit of preserving the combinatorial flavor of the problem. It then turns to two more general constructions of doubly-efficient interactive proof system: the proof system for sets having (uniform) bounded-depth circuits and the proof system for sets that are recognized in polynomial-time and small space. The presentation of the GKR construction is complete and is somewhat different from the original presentation. A brief overview is provided for the RRR construction.

Artículos relacionados

  • Knowledge-Based Intelligent System Advancements
    The integration of artificial intelligence and knowledge based methods and technologies as well as computer based information systems has created the next generation of information systems - intelligent information systems. This connection enables these new information systems to demonstrate novel capabilities, in particular: supporting users in decision making, processing data...
    Disponible

    236,86 €

  • Skills for Managing Rapidly Changing IT Projects
    Fabrizio Fioravanti
    ...
    Disponible

    83,82 €

  • Design and Usability of Digital Libraries
    Schubert Foo / Yin-Leng Theng
    ...
    Disponible

    79,71 €

  • Intelligent Information Technologies and Applications
    Vijayan Sugumaran
    ...
    Disponible

    93,32 €

  • Utilizing Information Technology Systems Across Disciplines
    With continual computer advances in the information technology age, information systems have become an integral part of many disciplines. Business, medicine, geography, aviation, forensics, agriculture, even traffic lights all have one thing in common - computers. Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science pr...
    Disponible

    255,96 €

  • Mobile Technology Consumption
    Whether used for communication, entertainment, socio-economic growth, crowd-sourcing social and political events, monitoring vital signs in patients, helping to drive vehicles, or delivering education, mobile technology has been transformed from a mode to a medium. Mobile Technology Consumption: Opportunities and Challenges explores essential questions related to the cost, bene...
    Disponible

    249,07 €

Otros libros del autor

  • Providing Sound Foundations for Cryptography
    Oded Goldreich
    Cryptography is concerned with the construction of schemes that withstand any abuse.A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dange...
    Disponible

    161,23 €

  • Providing Sound Foundations for Cryptography
    Oded Goldreich
    Cryptography is concerned with the construction of schemes that withstand any abuse.A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dange...
    Disponible

    185,73 €

  • Introduction to Property Testing
    Oded Goldreich
    ...
  • P, NP, and NP-Completeness
    Oded Goldreich
    ...
    Disponible

    57,94 €

  • P, NP, and NP-Completeness
    Oded Goldreich
    ...
    Disponible

    159,82 €

  • Probabilistic Proof Systems
    Oded Goldreich
    Various types of probabilistic proof systems have played a central role in the development of computer science in the last couple of decades. These proof systems deviate from the traditional concept of a proof by introducing randomization and interaction into the verification process. Probabilistic proof systems carry an error probability (which is explicitly bounded and can be...
    Disponible

    103,29 €