메뉴 건너뛰기




Volumn 11, Issue 1, 1998, Pages 61-80

A randomness-rounds tradeoff in private computation

Author keywords

Lower bounds; Private distributed computations; Randomness; Sensitivity

Indexed keywords


EID: 0011217520     PISSN: 08954801     EISSN: None     Source Type: Journal    
DOI: 10.1137/S089548019427634X     Document Type: Article
Times cited : (19)

References (45)
  • 1
    • 0025535378 scopus 로고
    • Simple constructions of almost k-wise independent random variables
    • IEEE Computer Society Press, Los Alamitos, CA
    • N. ALON, O. GOLDREICH, J. HÅSTAD, AND R. PERALTA, Simple constructions of almost k-wise independent random variables, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 544-553; also in Random Structures Algorithms, 3 (1992), pp. 289-304; also see addendum in 4 (1993), pp. 119-120.
    • (1990) Proc. 31st Annual IEEE Symposium on Foundations of Computer Science , pp. 544-553
    • Alon, N.1    Goldreich, O.2    Håstad, J.3    Peralta, R.4
  • 2
    • 84990678058 scopus 로고
    • also see addendum in 4 (1993), pp. 119-120
    • N. ALON, O. GOLDREICH, J. HÅSTAD, AND R. PERALTA, Simple constructions of almost k-wise independent random variables, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 544-553; also in Random Structures Algorithms, 3 (1992), pp. 289-304; also see addendum in 4 (1993), pp. 119-120.
    • (1992) Random Structures Algorithms , vol.3 , pp. 289-304
  • 5
    • 84979502594 scopus 로고
    • Security with low communication overhead
    • Advances in Cryptology, Lecture Notes in Computer Science 537, Springer-Verlag, New York
    • D. BEAVER, J. FEIGENBAUM, J. KILIAN, AND P. ROGAWAY, Security with low communication overhead, in Advances in Cryptology, Proc. Crypto '90, Lecture Notes in Computer Science 537, Springer-Verlag, New York, 1991, pp. 62-76.
    • (1991) Proc. Crypto '90 , pp. 62-76
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 8
    • 0020248370 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • IEEE Computer Society Press, Los Alamitos, CA
    • M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, in Proc. 22nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 112-117; also in SIAM J. Comput., 13 (1984), pp. 850-864.
    • (1982) Proc. 22nd Annual IEEE Symposium on Foundations of Computer Science , pp. 112-117
    • Blum, M.1    Micali, S.2
  • 9
    • 0021522644 scopus 로고
    • M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, in Proc. 22nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 112-117; also in SIAM J. Comput., 13 (1984), pp. 850-864.
    • (1984) SIAM J. Comput. , vol.13 , pp. 850-864
  • 10
    • 84948947435 scopus 로고
    • On the dealer's randomness required in secret sharing schemes
    • Lecture Notes in Computer Science 950, Springer-Verlag, New York
    • C. BLUNDO, A. GIORGIO GAGGIA, AND D. R. STINSON, On the dealer's randomness required in secret sharing schemes, in Proc. EuroCrypt94, Lecture Notes in Computer Science 950, Springer-Verlag, New York, 1995, pp. 35-46.
    • (1995) Proc. EuroCrypt94 , pp. 35-46
    • Blundo, C.1    Giorgio Gaggia, A.2    Stinson, D.R.3
  • 13
    • 11744322555 scopus 로고
    • Bounds on tradeoffs between randomness and communication complexity
    • IEEE Computer Society Press, Los Alamitos, CA
    • R. CANETTI AND O. GOLDREICH, Bounds on tradeoffs between randomness and communication complexity, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 35-44; also in Comput. Complexity, 3 (1993), pp. 141-167.
    • (1990) Proc. 31st Annual IEEE Symposium on Foundations of Computer Science , pp. 35-44
    • Canetti, R.1    Goldreich, O.2
  • 14
    • 0040655145 scopus 로고
    • R. CANETTI AND O. GOLDREICH, Bounds on tradeoffs between randomness and communication complexity, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 35-44; also in Comput. Complexity, 3 (1993), pp. 141-167.
    • (1993) Comput. Complexity , vol.3 , pp. 141-167
  • 18
    • 0024860209 scopus 로고
    • B. CHOR AND E. KUSHILEVITZ, A zero-one law for boolean privacy, in Proc. 21st Annual ACM Symposium on Theory of Computing, ACM, New York, 1989, pp. 62-72; also in SIAM J. Discrete Math., 4 (1991), pp. 36-47.
    • (1991) SIAM J. Discrete Math. , vol.4 , pp. 36-47
  • 19
    • 0040655149 scopus 로고
    • A communication-privacy tradeoff for modular addition
    • B. CHOR AND E. KUSHILEVITZ, A communication-privacy tradeoff for modular addition, Inform. Process. Lett., 45 (1993), pp. 205-210.
    • (1993) Inform. Process. Lett. , vol.45 , pp. 205-210
    • Chor, B.1    Kushilevitz, E.2
  • 21
    • 0029293045 scopus 로고
    • B. CHOR, M. GERÉB-GRAUS, AND E. KUSHILEVITZ, Private computations over the integers, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 335-344; also in SIAM J. Comput., 24 (1995), pp. 376-386.
    • (1995) SIAM J. Comput. , vol.24 , pp. 376-386
  • 23
    • 0022183152 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • IEEE Computer Society Press, Los Alamitos, CA
    • B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 429-442; also in SIAM J. Comput., 17 (1988), 230-261.
    • (1985) Proc. 26th Annual IEEE Symposium on Foundations of Computer Science , pp. 429-442
    • Chor, B.1    Goldreich, O.2
  • 24
    • 0023985259 scopus 로고
    • B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 429-442; also in SIAM J. Comput., 17 (1988), 230-261.
    • (1988) SIAM J. Comput. , vol.17 , pp. 230-261
  • 25
    • 0024766880 scopus 로고
    • Dispersere, deterministic amplification, and weak random sources
    • IEEE Computer Society Press, Los Alamitos, CA
    • A. COHEN AND A. WIGDERSON, Dispersere, deterministic amplification, and weak random sources, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 14-19.
    • (1989) Proc. 30th Annual IEEE Symposium on Foundations of Computer Science , pp. 14-19
    • Cohen, A.1    Wigderson, A.2
  • 28
    • 0005334452 scopus 로고
    • (De)randomized construction of small sample spaces in NC
    • IEEE Computer Society Press, Los Alamitos, CA
    • D. KARGER AND D. KOLLER, (De)randomized construction of small sample spaces in NC, in Proc. 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1994, pp. 252-263.
    • (1994) Proc. 35th Annual IEEE Symposium on Foundations of Computer Science , pp. 252-263
    • Karger, D.1    Koller, D.2
  • 32
    • 0024768184 scopus 로고
    • Privacy and communication complexity
    • IEEE Computer Society Press, Los Alamitos, CA
    • E. KUSHILEVITZ, Privacy and communication complexity, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 416-421; also in SIAM J. Discrete Math., 5 (1992), pp. 273-284.
    • (1989) Proc. 30th Annual IEEE Symposium on Foundations of Computer Science , pp. 416-421
    • Kushilevitz, E.1
  • 33
    • 0024768184 scopus 로고
    • E. KUSHILEVITZ, Privacy and communication complexity, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 416-421; also in SIAM J. Discrete Math., 5 (1992), pp. 273-284.
    • (1992) SIAM J. Discrete Math. , vol.5 , pp. 273-284
  • 35
    • 0011180890 scopus 로고    scopus 로고
    • E. KUSHILEVITZ AND Y. MANSOUR, Randomness in private computations, in Proc. 15th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1996, pp. 181-190; also in SIAM J. Discrete Math., 10 (1997), pp. 647-661.
    • (1997) SIAM J. Discrete Math. , vol.10 , pp. 647-661
  • 38
    • 0027641832 scopus 로고    scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • ACM, New York
    • J. NAOR AND M. NAOR, Small-bias probability spaces: Efficient constructions and applications, in Proc. 22nd Annual ACM Symposium on Theory of Computing, ACM, New York; also in SIAM J. Comput., 22 (1993), pp. 838-856.
    • Proc. 22nd Annual ACM Symposium on Theory of Computing
    • Naor, J.1    Naor, M.2
  • 39
    • 0027641832 scopus 로고    scopus 로고
    • J. NAOR AND M. NAOR, Small-bias probability spaces: Efficient constructions and applications, in Proc. 22nd Annual ACM Symposium on Theory of Computing, ACM, New York; also in SIAM J. Comput., 22 (1993), pp. 838-856.
    • (1993) SIAM J. Comput. , vol.22 , pp. 838-856
  • 40
  • 41
    • 85029615997 scopus 로고
    • Memory vs. randomization in on-line algorithms
    • Lecture Notes in Computer Science 372, Springer-Verlag, Berlin
    • P. RAGHAVAN AND M. SNIR, Memory vs. randomization in on-line algorithms, in Proc. 16th Annual Intl. Collegium on Automata, Languages, and Programming, Lecture Notes in Computer Science 372, Springer-Verlag, Berlin, 1989, pp. 687-703.
    • (1989) Proc. 16th Annual Intl. Collegium on Automata, Languages, and Programming , pp. 687-703
    • Raghavan, P.1    Snir, M.2
  • 43
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • IEEE Computer Society Press, Los Alamitos, CA
    • U. VAZIRANI AND V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 417-428.
    • (1985) Proc. 26th Annual IEEE Symposium on Foundations of Computer Science , pp. 417-428
    • Vazirani, U.1    Vazirani, V.2
  • 44
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • IEEE Computer Society Press, Los Alamitos, CA
    • A. C. YAO, Theory and applications of trapdoor functions, in Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 80-91.
    • (1982) Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science , pp. 80-91
    • Yao, A.C.1
  • 45
    • 0026372370 scopus 로고
    • Simulating BPP using a general weak random source
    • IEEE Computer Society Press, Los Alamitos, CA
    • D. ZUCKERMAN, Simulating BPP using a general weak random source, in Proc. 32nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1991, pp. 79-89.
    • (1991) Proc. 32nd Annual IEEE Symposium on Foundations of Computer Science , pp. 79-89
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.