{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:03Z","timestamp":1763468163417,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,12]],"date-time":"2014-01-12T00:00:00Z","timestamp":1389484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,12]]},"DOI":"10.1145\/2554797.2554845","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"523-540","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Rational arguments"],"prefix":"10.1145","author":[{"given":"Siyao","family":"Guo","sequence":"first","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Pavel","family":"Hub\u00e1\u010dek","sequence":"additional","affiliation":[{"name":"Aarhus University, Aarhus, Denmark"}]},{"given":"Alon","family":"Rosen","sequence":"additional","affiliation":[{"name":"IDC Herzliya, Herzliya, Israel"}]},{"given":"Margarita","family":"Vald","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2014,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1880918.1880936"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214069"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492002.2482561"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0493(1950)078<0001:VOFEIT>2.0.CO;2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"C.\n      Cachin S.\n      Micali and \n      M.\n      Stadler\n  . \n  Computationally private information retrieval with polylogarithmic communication\n  . In J. Stern editor EUROCRYPT volume \n  1592\n   of \n  Lecture Notes in Computer Science pages \n  402\n  --\n  414\n  . \n  Springer 1999\n  .   C. Cachin S. Micali and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In J. Stern editor EUROCRYPT volume 1592 of Lecture Notes in Computer Science pages 402--414. Springer 1999.","DOI":"10.1007\/3-540-48910-X_28"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2013.03.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"K.-M.\n      Chung Y. T.\n      Kalai and \n      S. P.\n      Vadhan\n  . \n  Improved delegation of computation using fully homomorphic encryption\n  . In T. Rabin editor CRYPTO volume \n  6223\n   of \n  Lecture Notes in Computer Science pages \n  483\n  --\n  501\n  . \n  Springer 2010\n  .   K.-M. Chung Y. T. Kalai and S. P. Vadhan. Improved delegation of computation using fully homomorphic encryption. In T. Rabin editor CRYPTO volume 6223 of Lecture Notes in Computer Science pages 483--501. Springer 2010.","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_4"},{"volume-title":"Succinctnp proofs and spooky interactions.","year":"2004","author":"Dwork C.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"R.\n      Gennaro C.\n      Gentry and \n      B.\n      Parno\n  . \n  Non-interactive verifiable computing: Outsourcing computation to untrusted workers\n  . In T. Rabin editor CRYPTO volume \n  6223\n   of \n  Lecture Notes in Computer Science pages \n  465\n  --\n  482\n  . \n  Springer 2010\n  .   R. Gennaro C. Gentry and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In T. Rabin editor CRYPTO volume 6223 of Lecture Notes in Computer Science pages 465--482. Springer 2010.","DOI":"10.1007\/978-3-642-14623-7_25"},{"volume-title":"Quadratic span programs and succinct NIZKs without PCPs. IACR Cryptology ePrint Archive","year":"2012","author":"Gennaro R.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993651"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000001437"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00037-002-0169-0"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374396"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J.\n      Groth\n    .\n  Short pairing-based non-interactive zero-knowledge arguments\n  . In M. Abe editor ASIACRYPT volume \n  6477\n   of \n  Lecture Notes in Computer Science pages \n  321\n  --\n  340\n  . \n  Springer 2010\n  .  J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In M. Abe editor ASIACRYPT volume 6477 of Lecture Notes in Computer Science pages 321--340. Springer 2010.","DOI":"10.1007\/978-3-642-17373-8_19"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488679"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129782"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422487"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_10"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795284959"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/972639.972643"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/0221053"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488709"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_5"}],"event":{"name":"ITCS'14: Innovations in Theoretical Computer Science","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Princeton New Jersey USA","acronym":"ITCS'14"},"container-title":["Proceedings of the 5th conference on Innovations in theoretical computer science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554797.2554845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2554797.2554845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:22Z","timestamp":1750232062000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554797.2554845"}},"subtitle":["single round delegation with sublinear verification"],"short-title":[],"issued":{"date-parts":[[2014,1,12]]},"references-count":29,"alternative-id":["10.1145\/2554797.2554845","10.1145\/2554797"],"URL":"https:\/\/doi.org\/10.1145\/2554797.2554845","relation":{},"subject":[],"published":{"date-parts":[[2014,1,12]]},"assertion":[{"value":"2014-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}