2018
DOI: 10.4230/lipics.icalp.2018.14
|View full text |Cite
|
Sign up to set email alerts
|

Fast Reed-Solomon Interactive Oracle Proofs of Proximity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 0 publications
0
0
0
Order By: Relevance
“…even with degrees as small as 20), and thus denote this exhaustion by MT (memory thrashing). Finally, we mention if the protocol is feasibly post-quantum (P-Q) secure in the 'P-Q' column ( [8,12] are P-Q-secure, [14] do not mention it but seems P-Q-secure, all the others, including us, use bilinear pairings). In Appendix E, we abstract the requirements of our protocols to see if they could be modified to use only postquantum secure routines.…”
Section: Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…even with degrees as small as 20), and thus denote this exhaustion by MT (memory thrashing). Finally, we mention if the protocol is feasibly post-quantum (P-Q) secure in the 'P-Q' column ( [8,12] are P-Q-secure, [14] do not mention it but seems P-Q-secure, all the others, including us, use bilinear pairings). In Appendix E, we abstract the requirements of our protocols to see if they could be modified to use only postquantum secure routines.…”
Section: Protocolmentioning
confidence: 99%
“…Correctness. First, (8) gives the correctness of Read. For Update, (9) provides the correctness of the hash tree.…”
Section: Server Communications Clientmentioning
confidence: 99%
See 1 more Smart Citation