메뉴 건너뛰기




Volumn 58, Issue 1, 1999, Pages 129-136

Characterizing linear size circuits in terms of privacy

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTATIONAL COMPLEXITY; LINEAR NETWORK ANALYSIS; NETWORK PROTOCOLS; RANDOM PROCESSES;

EID: 0033075133     PISSN: 00220000     EISSN: None     Source Type: Journal    
DOI: 10.1006/jcss.1997.1544     Document Type: Article
Times cited : (21)

References (21)
  • 1
    • 0024940038 scopus 로고    scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of Rounds
    • J. Bar-Ilan and D. Beaver, Non-cryptographic fault-tolerant computing in a constant number of Rounds, in "Proc. of 8th POD, 1989," pp. 201-209.
    • Proc. of 8th POD, 1989 , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 3
    • 0021370261 scopus 로고
    • A Boolean function requiring 3n network size
    • N. Blum, A Boolean function requiring 3n network size, Theoret. Comput. Sci. 28 (1984), 337-345.
    • (1984) Theoret. Comput. Sci. , vol.28 , pp. 337-345
    • Blum, N.1
  • 4
    • 0000392346 scopus 로고
    • The complexity of Boolean functions
    • Chap. 14, MIT Press, Cambridge, MA
    • R. B. Boppana and M. Sipser, The complexity of Boolean functions, in "Handbook of Theoretical Computer Science," Vol. A., Chap. 14, pp. 757-804, MIT Press, Cambridge, MA, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.A , pp. 757-804
    • Boppana, R.B.1    Sipser, M.2
  • 5
    • 84898960610 scopus 로고    scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in "Proc. of 20th STOC, 1988," pp. 1-10.
    • Proc. of 20th STOC, 1988 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 84958034013 scopus 로고    scopus 로고
    • On the number of random bits in totally private computations
    • "Proc. of 22nd ICALP, Berlin, 1995,"
    • C. Blundo, A. De-Santis, G. Persiano, and U. Vaccaro, On the number of random bits in totally private computations, in "Proc. of 22nd ICALP, Berlin, 1995," pp. 171-182. Lectures Notes in Comput. Sci., Vol. 944.
    • Lectures Notes in Comput. Sci. , vol.944 , pp. 171-182
    • Blundo, C.1    De-Santis, A.2    Persiano, G.3    Vaccaro, U.4
  • 9
    • 0002738457 scopus 로고
    • A zero-one law for Boolean privacy
    • STOC 89
    • B. Chor and E. Kushilevitz, A zero-one law for Boolean privacy, SIAM J. Disc. Math. 4 (1991), 36-47; STOC 89.
    • (1991) SIAM J. Disc. Math. , vol.4 , pp. 36-47
    • Chor, B.1    Kushilevitz, E.2
  • 10
    • 0029293045 scopus 로고
    • Private computations over the integers
    • FOCS 90
    • B. Chor, M. Geréb-Graus, and E. Kushilevitz, Private computations over the integers, SIAM J. Comput. 24, No. 2 (1995), 376-386; FOCS 90.
    • (1995) SIAM J. Comput. , vol.24 , Issue.2 , pp. 376-386
    • Chor, B.1    Geréb-Graus, M.2    Kushilevitz, E.3
  • 12
    • 0026985378 scopus 로고    scopus 로고
    • Communication complexity of secure computation
    • M. Franklin and M. Yung, Communication complexity of secure computation, "Proc. of 24th STOC, 1992," pp. 699-710.
    • Proc. of 24th STOC, 1992 , pp. 699-710
    • Franklin, M.1    Yung, M.2
  • 15
  • 16
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • FOCS 89
    • E. Kushilevitz, Privacy and communication complexity, SIAM J. Disc. Math. 5, No. 2 (1992), 273-284; FOCS 89.
    • (1992) SIAM J. Disc. Math. , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 17
    • 85030064106 scopus 로고    scopus 로고
    • A randomness-rounds tradeoff in private computation
    • to appear; Crypto 94
    • E. Kushilevitz and A. Rosén, A randomness-rounds tradeoff in private computation, SIAM J. Disc. Math., to appear; Crypto 94.
    • SIAM J. Disc. Math.
    • Kushilevitz, E.1    Rosén, A.2
  • 18
    • 0040666550 scopus 로고
    • A 2.5n lower bound on the combinatorial complexity of Boolean functions
    • W. J. Paul, A 2.5n lower bound on the combinatorial complexity of Boolean functions, SIAM Comput. 5, No. 3 (1977), 427-443.
    • (1977) SIAM Comput. , vol.5 , Issue.3 , pp. 427-443
    • Paul, W.J.1
  • 19
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, A mathematical theory of communication, Bell System Tech. Jour. 27 (1948), 379-423, 623-656.
    • (1948) Bell System Tech. Jour. , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 20
    • 0022882770 scopus 로고    scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao, How to generate and exchange secrets, in "Proc. of 27th FOCS, 1986," pp. 162-167.
    • Proc. of 27th FOCS, 1986 , pp. 162-167
    • Yao, A.C.1
  • 21
    • 0026170638 scopus 로고
    • A 4n lowerbound on the combinational complexity of certain symmetric Boolean functions over the basis of unate dyadic Boolean functions
    • U. Zwick, A 4n lowerbound on the combinational complexity of certain symmetric Boolean functions over the basis of unate dyadic Boolean functions, SIAM J. Comput. 20 (1991).
    • (1991) SIAM J. Comput. , vol.20
    • Zwick, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.