Verification protocols with sub-linear communication for polynomial matrix operations

نویسندگان

چکیده

We design and analyze new protocols to verify the correctness of various computations on matrices over ring F[x] univariate polynomials a field F. For sake efficiency, because many properties we are specific principal ideal domain, cannot simply rely previously-developed linear algebra for field. Our interactive, often randomized, feature constant number rounds communication between Prover Verifier. seek minimize cost so that amount data sent during protocol is significantly smaller than size result being verified, which can be useful when combining or in some multi-party settings. The main tools use reductions existing verification given vector F[x]-row space matrix.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Verification of Communication Protocols

In this paper we present a formal abstract speciication for TCP/IP transport level protocols and formally verify that TCP satisses this speciication. We also present a formal description of an experimental protocol, T/TCP, which proposes to provide the same service as TCP, but with optimizations to make it eecient for transactions. We further show that this protocol does not provide the same se...

متن کامل

Sub-linear Universal Spatial Gossip Protocols

Gossip protocols are communication protocols in which, periodically, every node of a network exchanges information with some other node chosen according to some (randomized) strategy. These protocols have recently found various types of applications for the management of distributed systems. Spatial gossip protocols are gossip protocols that use the underlying spatial structure of the network, ...

متن کامل

Experimental Evaluation of Simplified Verification Methods for Responsive Communication Protocols

We consider responsiveness veri cation of communication protocols on the client-server system CSN , which consists of one client site and N (N 2) server sites, under the assumption that a single transient failure occurs on any one server site. For the veri cation, a typical naive method NAIV generates exhaustively all abnormal system states reachable after the failure, and then calculates the r...

متن کامل

Formal verification of communication protocols for wireless networks

Wireless networks have became in recent years a constant in the every day life of an increasing amount of people. In a virtuous circle, newer and more sophisticated protocols are designed every day, increasing the available tools and attracting even more users. However newer tools are needed to help designers on their job of creating better software and protocols for this kind of network. Tradi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Symbolic Computation

سال: 2021

ISSN: ['1095-855X', '0747-7171']

DOI: https://doi.org/10.1016/j.jsc.2020.06.006