메뉴 건너뛰기




Volumn 13, Issue 1, 2000, Pages 107-142

Randomness versus fault-tolerance

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0011213598     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s001459910005     Document Type: Article
Times cited : (11)

References (62)
  • 1
    • 84990678058 scopus 로고
    • Simple Constructions of Almost Jt-Wise Independent Random Variables, FOCS 90 and
    • [AGHP] Addendum: Vol. 4,1993, pp. 119-120
    • [AGHP] N. Alon, O. Goldreich, J. Hastad, and R. Peralta, Simple Constructions of Almost Jt-Wise Independent Random Variables, FOCS 90 and Random Structures Algorithms, Vol. 3, 1992, pp. 289-304. (Addendum: Vol. 4,1993, pp. 119-120)
    • (1992) Random Structures Algorithms , vol.3 , pp. 289-304
    • Alon, N.1    Goldreich, O.2    Hastad, J.3    Peralta, R.4
  • 3
    • 0002382799 scopus 로고
    • Foundations of Secure Interactive Computing
    • [B2]
    • [B2] D. Beaver, Foundations of Secure Interactive Computing, Proc. CRYPTO, 1991, pp. 377-391.
    • (1991) Proc. CRYPTO , pp. 377-391
    • Beaver, D.1
  • 4
    • 33746365751 scopus 로고
    • Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority, J
    • [B3]
    • [B3] D. Beaver, Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Fault Minority, J. Cryptology, Vol. 4, 1991, pp. 75-122.
    • (1991) Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 5
    • 0024940038 scopus 로고
    • Non-Cryptographic Fault-Tolerant Computing in a Constant Number o Rounds
    • [BB]
    • [BB] J. Bar-IIan and D. Beaver, Non-Cryptographic Fault-Tolerant Computing in a Constant Number o Rounds, Proc. Sth PODC, 1989, pp. 201-209.
    • (1989) Proc. Sth PODC , pp. 201-209
    • Bar-Han, J.1    Beaver, D.2
  • 7
    • 84958034013 scopus 로고
    • On the Number of Random Bits in Totall Private Computations
    • BDPV Springer-Verlag, Berlin
    • [BDPVJ C. Blundo, A. De-Santis, G. Persiano, and U. Vaccaro, On the Number of Random Bits in Totall Private Computations, Proc. ICALP, LNCS 944, Springer-Verlag, Berlin, 1995, pp. 171-182.
    • (1995) Proc. ICALP, LNCS , vol.944 , pp. 171-182
    • Blundo, J.C.1    De-Santis, A.2    Persiano, G.3    Vaccaro, U.4
  • 8
    • 85027395928 scopus 로고
    • Randomness in Distribution Protocols
    • [BDV] Springer-Verlag, Berlin
    • [BDV] C. Blundo, A. De-Santis, and U. Vaccaro, Randomness in Distribution Protocols, Proc. ICALP LNCS 820, Springer-Verlag, Berlin, 1994, pp. 568-579.
    • (1994) Proc. ICALP LNCS 820 , pp. 568-579
    • Blundo, C.1    De-Santis, A.2    Vaccaro, U.3
  • 11
    • 84898960610 scopus 로고    scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • [BOW]
    • [BOW] M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. STOC, 1988, pp. 1-10.
    • Proc. STOC , vol.1988 , pp. 1-10
    • Ben-or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 12
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Rando Bits, FOCS 82 and
    • [BM]
    • [BM] M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of Pseudo-Rando Bits, FOCS 82 and SIAMJ. Comput., Vol. 13,1984, pp. 850-864
    • (1984) SIAMJ. Comput. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 13
    • 0006620177 scopus 로고
    • [Cl] Ph.D. Thesis, Departmen of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, June
    • [Cl] R. Canetti, Studies in Secure Multi-Party Computation and Applications, Ph.D. Thesis, Departmen of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, June 1995
    • (1995) Studies in Secure Multi-Party Computation and Applications
    • Canetti, R.1
  • 14
    • 84878910145 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • [C2]
    • [C2] R. Canetti, Security and Composition of Multiparty Cryptographic Protocols, J. Cryptology, thi issue.
    • J. Cryptology , Issue.THI ISSUE
    • Canetti, R.1
  • 15
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • [CCD]
    • [CCD] D. Chaum, C. Crepeau, and I. Damgard, Multiparty Unconditionally Secure Protocols, Proc. STOC 1988, pp. 11-19.
    • (1988) Proc. STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 16
    • 0012242251 scopus 로고
    • Randomization in Byzantine Agreement
    • [CD]
    • [CD] B. Chor and C. Dwork, Randomization in Byzantine Agreement, Adv. Comput. Res., Vol. 5,1989 pp. 443-4197.
    • (1989) Adv. Comput. Res. , vol.5 , pp. 443-4197
    • Chor, B.1    Dwork, C.2
  • 18
    • 0023985259 scopus 로고
    • Unbiased Bits from Sources of Weak Randomness and Probabilisti Communication Complexity, FOCS 85 and
    • [CG1]
    • [CG1] B. Chor and O. Goldreich, Unbiased Bits from Sources of Weak Randomness and Probabilisti Communication Complexity, FOCS 85 and SICOMP, Vol. 17,1988, pp. 230-261.
    • (1988) SICOMP , vol.17 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 19
    • 0040655145 scopus 로고
    • Bounds on Tradeoffs between Randomness and Communicatio Complexity, FOCS 90 and
    • [CG2]
    • [CG2] R. Canetti and O. Goldreich, Bounds on Tradeoffs between Randomness and Communicatio Complexity, FOCS 90 and Comput. Complexity, Vol. 3,1993, pp. 141-167.
    • (1993) Comput. Complexity , vol.3 , pp. 141-167
    • Canetti, R.1    Goldreich, O.2
  • 20
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achievin Simultaneity in the Presence of Faults
    • [COMA]
    • [COMA] B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable Secret Sharing and Achievin Simultaneity in the Presence of Faults, Proc. FO'CS, 1985, pp. 383-395.
    • (1985) Proc. FO'CS , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 21
    • 0002738457 scopus 로고
    • A Zero-One Law for Boolean Privacy, STOC 89 and
    • [CK1]
    • [CK1] B. Chor and E. Kushilevitz, A Zero-One Law for Boolean Privacy, STOC 89 and SIDMA, Vol. 4 1991, pp. 36-47.
    • (1991) SIDMA , vol.4 , pp. 36-47
    • Chor, B.1    Kushilevitz, E.2
  • 22
    • 0040655149 scopus 로고
    • A Communication-Privacy Tradeoff for Modular Addition
    • [CK2]
    • [CK2] B. Chor and E. Kushilevitz, A Communication-Privacy Tradeoff for Modular Addition, Inform Process. Lett., Vol. 45, 1993, pp. 205-210.
    • (1993) Inform Process. Lett. , vol.45 , pp. 205-210
    • Chor, B.1    Kushilevitz, E.2
  • 23
    • 0027227135 scopus 로고
    • Randomness-Optimal Unique Element Isolation, wit Application to Perfect Matching and Related Problems
    • [CRS]
    • [CRS] S. Chari, P. Rohatgi, and A. Srinivasan, Randomness-Optimal Unique Element Isolation, wit Application to Perfect Matching and Related Problems, Proc. STOC, 1993, pp. 458-467.
    • (1993) Proc. STOC , pp. 458-467
    • Chari, S.1    Rohatgi, P.2    Srinivasan, A.3
  • 24
    • 0027986369 scopus 로고
    • A Minimal Model for Secure Computation
    • [FKN]
    • [FKN] U. Feige, J. Kilian, and M. Naor, A Minimal Model for Secure Computation, Proc. STOC, 1994 pp. 554-563. .,
    • (1994) Proc. STOC , pp. 554-563
    • Feige, U.1    Kilian, J.2    Naor, M.3
  • 25
    • 0000613943 scopus 로고
    • A Lower Bound for the Time to Assure Interactive Consistency
    • [FL]
    • [FL] M. Fischer and N. Lynch, A Lower Bound for the Time to Assure Interactive Consistency, IPL Vol. 14, No. 4,1982, pp. 183-186.
    • (1982) IPL , vol.14 , Issue.4 , pp. 183-186
    • Fischer, M.1    Lynch, N.2
  • 26
    • 0022045868 scopus 로고
    • Impossibility of Distributed Consensus with on Faulty Process
    • [FLP]
    • [FLP] M. J. Fischer, N. A. Lynch, and M. S. Paterson, Impossibility of Distributed Consensus with On Faulty Process, J. Assoc. Comput. Mach., Vol. 32, No. 2,1985, pp. 374-382.
    • (1985) J. Assoc. Comput. Mach. , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 27
    • 0031210863 scopus 로고    scopus 로고
    • An Optimal Algorithm for Synchronous Byzantine Agreement, STO 88 and
    • [FM]
    • [FM] P. Feldman and S. Micali, An Optimal Algorithm for Synchronous Byzantine Agreement, STO 88 and SIAM J. Comput., Vol. 26, No. 4,1997, pp. 873-933.
    • (1997) SIAM J. Comput. , vol.26 , Issue.4 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 28
    • 0026985378 scopus 로고
    • Communication Complexity of Secure Computation
    • [FY]
    • [FY] M. Franklin, and M. Yung, Communication Complexity of Secure Computation, Proc. STOC, 1992 pp. 699-710.
    • (1992) Proc. STOC , pp. 699-710
    • Franklin, M.1    Yung, M.2
  • 31
    • 0012527958 scopus 로고
    • Fair Computation of General Functions in Presence of Immora Majority
    • [GL]
    • [GL] S. Goldwasser and L. Levin, Fair Computation of General Functions in Presence of Immora Majority, Proc. CRYPTO, 1990.
    • (1990) Proc. CRYPTO
    • Goldwasser, S.1    Levin, L.2
  • 32
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • [GMR]
    • [GMR] S. Goldwasser, S. Micali, and C. Rackoff, The Knowledge Complexity of Interactive Proof Systems SIAMJ. Comput., Vol. 18, No. 1,1989, pp. 186-208
    • (1989) SIAMJ. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 33
    • 33745976130 scopus 로고
    • On the Cunning Power of Cheating Verifiers: Some Observations abou Zero-Knowledge Proofs, in preparation. Preliminary version by Y. Oren in
    • [GO]
    • [GO] O. Goldreich and Y. Oren, On the Cunning Power of Cheating Verifiers: Some Observations abou Zero-Knowledge Proofs, in preparation. Preliminary version by Y. Oren in Proc. 28;/i FOCS, 1987
    • (1987) Proc. 28;/i FOCS
    • Goldreich, O.1    Oren, Y.2
  • 34
    • 0031628398 scopus 로고    scopus 로고
    • Simplified VSS and Fact-Track Multiparty Computations wit Applications to Threshold Cryptography
    • [GRR]
    • [GRR] R. Gennaro, T. Rabin, and M. Rabin, Simplified VSS and Fact-Track Multiparty Computations wit Applications to Threshold Cryptography, Proc. PODC, 1998, pp. 101-111.
    • Proc. PODC , vol.1998 , pp. 101-111
    • Gennaro, R.1    Rabin, T.2    Rabin, M.3
  • 35
    • 84969331532 scopus 로고    scopus 로고
    • Pseudo-Random Generators under Uniform Assumptions
    • [H]
    • [H] J. Hastad, Pseudo-Random Generators under Uniform Assumptions, Proc. STOC 90.
    • Proc. STOC 90.
    • Hastad, J.1
  • 36
    • 85029616064 scopus 로고    scopus 로고
    • Pseudo-Random Generation from One-Way Functions Proc
    • [ILL]
    • [ILL] R. Impagliazzo, R., L. Levin, and M. Luby, Pseudo-Random Generation from One-Way Functions Proc. STOC 89.
    • STOC 89.
    • Impagliazzo, R.1    Levin, L.2    Luby, M.3
  • 38
    • 0002365530 scopus 로고
    • Privacy and Communication Complexity, FOCS 89, and
    • [K]
    • [K] E. Kushilevitz, Privacy and Communication Complexity, FOCS 89, and SIAM J. Discrete Math. Vol. 5, No. 2,1992, pp. 273-284
    • (1992) SIAM J. Discrete Math. , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 39
    • 0031339396 scopus 로고    scopus 로고
    • (De)randomized Construction of Small Sample Spaces in NC
    • [KK]
    • [KK] D. Karger and D. Koller, (De)randomized Construction of Small Sample Spaces in NC, FOCS 94 and J. Comput. System Sci., Vol. 55, No. 3,1997, pp. 402-413.
    • (1997) FOCS 94 and J. Comput. System Sci. , vol.55 , Issue.3 , pp. 402-413
    • Karger, D.1    Koller, D.2
  • 40
    • 0000062463 scopus 로고
    • Constructing Small Sample Spaces Satisfying Given Constraints, STO 93 and
    • [KM1]
    • [KM1] D. Koller and N. Megiddo, Constructing Small Sample Spaces Satisfying Given Constraints, STO 93 and SIAM J. Discrete Math., Vol. 7, No. 2,1994, pp. 260-274
    • (1994) SIAM J. Discrete Math. , vol.7 , Issue.2 , pp. 260-274
    • Koller, D.1    Megiddo, N.2
  • 41
    • 0028060850 scopus 로고
    • Derandomization through Approximation: An WC Algorithm for Minimum Cuts
    • [KM2]
    • [KM2] D. Karger and R. Motwani, Derandomization through Approximation: An WC Algorithm for Minimum Cuts, Proc. 26th STOC, 1994, pp. 497-506
    • (1994) Proc. 26th STOC , pp. 497-506
    • Karger, D.1    Motwani, R.2
  • 42
    • 0031459086 scopus 로고    scopus 로고
    • [KM3]
    • [KM3] H. Karloff and Y. Mansour, On Construction of it-wise Independent Random Variables, STOC 94 and Combinatorial, Vol. 17, No. 1,1997, pp. 91-107
    • (1997) Combinatorial , vol.17 , Issue.1 , pp. 91-107
    • Karloff, H.1    Mansour, Y.2    Variables, O.C.3
  • 47
    • 84894203891 scopus 로고
    • A Time-Randomness Tradeoff for Oblivious Routing
    • [KPU]
    • [KPU] D. Krizanc, D. Peleg, and E. Upfal, A Time-Randomness Tradeoff for Oblivious Routing, Proc STOC, 1988, pp. 93-102.
    • (1988) Proc STOC , pp. 93-102
    • Krizanc, D.1    Peleg, D.2    Upfal, E.3
  • 48
    • 0011217520 scopus 로고    scopus 로고
    • A Randomness-Rounds Tradeoff in Private Computation, CRYPT 94 and
    • [KR]
    • [KR] E. Kushilevitz and A. Rosén, A Randomness-Rounds Tradeoff in Private Computation, CRYPT 94 and SIAMJ. Discrete Math., Vol. 11, No. 1, 1998, pp. 61-80.
    • (1998) SIAMJ. Discrete Math. , vol.11 , Issue.1 , pp. 61-80
    • Kushilevitz, E.1    Rosén, A.2
  • 49
    • 0002918554 scopus 로고
    • The Complexity of Non-Uniform Random Number Generation, i
    • [KY] ed. J. Traub
    • [KY] D. E. Knuth and A. C. Yao, The Complexity of Non-Uniform Random Number Generation, I Algorithms and Complexity, ed. J. Traub, 1976, pp. 357-428.
    • (1976) Algorithms and Complexity , pp. 357-428
    • Knuth, D.E.1    Yao, A.C.2
  • 51
    • 0002187139 scopus 로고    scopus 로고
    • Secure Computation, manuscript, 1992 (updated version, 1998). Preliminary version in
    • [MR]
    • [MR] S. Micali and P. Rogaway, Secure Computation, manuscript, 1992 (updated version, 1998). Preliminary version in P we. CRYPTO 91, pp. 392-4104.
    • P We. CRYPTO 91 , pp. 392-4104
    • Micali, S.1    Rogaway, P.2
  • 52
    • 0025152619 scopus 로고
    • Pseudorandom Generator for Space Bounded Computation
    • [N]
    • [N] N. Nisan, Pseudorandom Generator for Space Bounded Computation, Proc. 22nd STOC, 1990 pp. 204-212.
    • (1990) Proc. 22nd STOC , pp. 204-212
    • Nisan, N.1
  • 53
    • 0027641832 scopus 로고
    • Small-Bias Probability Spaces: Efficient Constructions and Applications STOC 90 and
    • [NN]
    • [NN] J. Naor and M. Naor, Small-Bias Probability Spaces: Efficient Constructions and Applications STOC 90 and SIAM J. Comput., Vol. 22, No. 4,1993, pp. 838-856.
    • (1993) SIAM J. Comput. , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 54
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • [RB]
    • [RB] T. Rabin and M. Ben-Or, Verifiable Secret Sharing and Multiparty Protocols with Honest Majority Proc. 2lst STOC, 1989, pp. 73-85.
    • (1989) Proc. 2lst STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 55
    • 85029615997 scopus 로고
    • Memory vs. Randomization in On-Line Algorithms
    • [RS]
    • [RS] P. Raghavan and M. Snir, Memory vs. Randomization in On-Line Algorithms, Proc. ICALP, 1989 pp. 687-703
    • (1989) Proc. ICALP , pp. 687-703
    • Raghavan, P.1    Snir, M.2
  • 56
    • 0018545449 scopus 로고
    • How to Share a Secret
    • [SI]
    • [SI] A. Shamir, How to Share a Secret, Comm. ACM, Vol. 22,1979, pp. 612-613.
    • (1979) Comm. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 57
    • 0026977180 scopus 로고
    • Sample Spaces Uniform on Neighborhoods
    • [S2]
    • [S2] L. J. Schulman, Sample Spaces Uniform on Neighborhoods, Proc. 24th STOC, 1992, pp. 17-25.
    • (1992) Proc. 24th STOC , pp. 17-25
    • Schulman, L.J.1
  • 60
    • 0020301290 scopus 로고
    • Theory and Applications of Trapdoor Functions
    • [Yl]
    • [Yl] A. C. Yao, Theory and Applications of Trapdoor Functions, Proc. 23rd FOCS, 1982, pp. 80-91.
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 61
    • 0020312165 scopus 로고
    • Protocols for Secure Computation
    • [Y2]
    • [Y2] A. Yao, Protocols for Secure Computation, Proc. 23rd FOCS, 1982, pp. 160-164.
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.1
  • 62
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP Using a General Weak Random Source, FOCS 91
    • [Z]
    • [Z] D. Zuckerman, Simulating BPP Using a General Weak Random Source, FOCS 91 zndAlgorithinica, Vol. 16,1996, pp. 367-391.
    • (1996) ZndAlgorithinica , vol.16 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.