Computational complexity: a conceptual perspective

O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …

On the possibilities of ai-generated text detection

S Chakraborty, AS Bedi, S Zhu, B An… - arXiv preprint arXiv …, 2023 - arxiv.org
Our work addresses the critical issue of distinguishing text generated by Large Language
Models (LLMs) from human-produced text, a task essential for numerous applications …

[图书][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[图书][B] Foundations of Cryptography, Volume 2

O Goldreich - 2004 - wisdom.weizmann.ac.il
Cryptography is concerned with the construction of schemes that should maintain a desired
functionality, even under malicious attempts aimed at making them deviate from it. The …

Adiabatic quantum state generation and statistical zero knowledge

D Aharonov, A Ta-Shma - Proceedings of the thirty-fifth annual ACM …, 2003 - dl.acm.org
The design of new quantum algorithms has proven to be an extremely difficult task. This
paper considers a different approach to the problem, by studying the problem of'quantum …

A complete problem for statistical zero knowledge

A Sahai, S Vadhan - Journal of the ACM (JACM), 2003 - dl.acm.org
We present the first complete problem for SZK, the class of promise problems possessing
statistical zero-knowledge proofs (against an honest verifier). The problem, called Statistical …

Testing symmetric properties of distributions

P Valiant - Proceedings of the fortieth annual ACM symposium on …, 2008 - dl.acm.org
We introduce the notion of a Canonical Tester for a class of properties on distributions, that
is, a tester strong and general enough that" a distribution property in the class is testable if …

Non-interactive zero-knowledge proofs for composite statements

S Agrawal, C Ganesh, P Mohassel - … , Santa Barbara, CA, USA, August 19 …, 2018 - Springer
The two most common ways to design non-interactive zero-knowledge (NIZK) proofs are
based on Sigma protocols and QAP-based SNARKs. The former is highly efficient for …

Statistical zero-knowledge proofs with efficient provers: Lattice problems and more

D Micciancio, SP Vadhan - Advances in Cryptology-CRYPTO 2003: 23rd …, 2003 - Springer
We construct several new statistical zero-knowledge proofs with efficient provers, ie ones
where the prover strategy runs in probabilistic polynomial time given an NP witness for the …

Cryptanalysis of stream ciphers with linear masking

D Coppersmith, S Halevi, C Jutla - … , California, USA, August 18–22, 2002 …, 2002 - Springer
We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly
random process. Roughly, the ciphers to which this method applies consist of a “non-linear …