메뉴 건너뛰기




Volumn 839 LNCS, Issue , 1994, Pages 397-410

A randomness-rounds tradeoff in private computation

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; CRYPTOGRAPHY;

EID: 0040655150     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48658-5_36     Document Type: Conference Paper
Times cited : (15)

References (29)
  • 1
    • 0025535378 scopus 로고
    • Simple constructions of almost k-wise independent random variables
    • N. Alou, O. Goldreich, J. Hastad, and R. Peralta, “Simple constructions of almost k-wise independent random variables”, Proc. of 31st FOCS, 1990, pp. 544–553.
    • (1990) Proc. of 31St FOCS , pp. 544-553
    • Alou, N.1    Goldreich, O.2    Hastad, J.3    Peralta, R.4
  • 2
    • 0024940038 scopus 로고
    • Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds
    • J. Bar-Ilan, and D. Beaver, “Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds”, Proc. of 8th PODC, 1989, pp. 201–209.
    • (1989) Proc. of 8Th PODC , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 6
    • 84898960610 scopus 로고
    • Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • M. Ben-or, S. Goldwasser, and A. Wigderson, “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation”, Proc. of 20th STOC, 1988, pp. 1–10.
    • (1988) Proc. of 20Th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits
    • M. Blum, and S. Micali “How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits”, FOCS 82 and SIAM J. on Computing, Vol 13, 1984, pp. 850–864.
    • (1984) FOCS 82 and SIAM J. on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 10
    • 0040655145 scopus 로고
    • Bounds on Tradeoffs between Randomness and Communication Complexity
    • R. Canetti, and O. Goldreich, “Bounds on Tradeoffs between Randomness and Communication Complexity”, FOCS 90 and Computational Complexity Vol. 3, (1993), 141–167.
    • (1993) FOCS 90 and Computational Complexity , vol.3 , pp. 141-167
    • Canetti, R.1    Goldreich, O.2
  • 11
    • 84898947315 scopus 로고
    • Multiparty Unconditionally Secure Protocols
    • D. Chaum, C. Crepeau, and I. Damgard, “Multiparty Unconditionally Secure Protocols”, Proc. of 20th STOC, 1988, pp. 11–19.
    • (1988) Proc. of 20Th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 12
    • 0002738457 scopus 로고
    • A Zero-One Law for Boolean Privacy”, STOC 89 and SIAM
    • B. Chor, and E. Kushilevitz, “A Zero-One Law for Boolean Privacy”, STOC 89 and SIAM J. Disc. Math. Vol. 4, (1991), 36–47.
    • (1991) J. Disc. Math , vol.4 , pp. 36-47
    • Chor, B.1    Kushilevitz, E.2
  • 13
    • 0040655149 scopus 로고
    • A Communication-Privacy Tradeoff for Modular Addition
    • B. Chor, and E. Kushilevitz, “A Communication-Privacy Tradeoff for Modular Addition”, Information Processing Letters, Vol. 45, 1993, pp. 205–210.
    • (1993) Information Processing Letters , vol.45 , pp. 205-210
    • Chor, B.1    Kushilevitz, E.2
  • 15
    • 0028675686 scopus 로고
    • On the Structure of the Privacy Hierarchy
    • B. Chor, M. Geréb-Graus, and E. Kushilevitz, “On the Structure of the Privacy Hierarchy”, Journal of Cryptology, Vol. 7, No. 1, 1994, pp. 53–60.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 53-60
    • Chor, B.1    Geréb-Graus, M.2    Kushilevitz, E.3
  • 16
    • 0023985259 scopus 로고
    • Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
    • B. Chor, and O. Goldreich, “Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity”, FOCS 85 and SIAM J. Computing Vol. 17, (1988), 230–261.
    • (1988) FOCS 85 and SIAM J. Computing , vol.17 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 17
    • 0024766880 scopus 로고
    • Dispersers, Deterministic Amplification, and Weak Random Sources
    • A. Cohen, and A. Wigderson, “Dispersers, Deterministic Amplification, and Weak Random Sources”, Proc. of 30th FOCS, 1989, pp. 14–19.
    • (1989) Proc. of 30Th FOCS , pp. 14-19
    • Cohen, A.1    Wigderson, A.2
  • 18
    • 0026985378 scopus 로고
    • Communication complexity of secure computation
    • M. Franklin, and M. Yung, “Communication complexity of secure computation”, Proc. of 24th STOC, 1992, pp. 699–710.
    • (1992) Proc. of 24Th STOC , pp. 699-710
    • Franklin, M.1    Yung, M.2
  • 20
    • 0027274447 scopus 로고
    • Constructing Small Sample Spaces Satisfying Given Constraints
    • D. Koller, and N. Megiddo, “Constructing Small Sample Spaces Satisfying Given Constraints”, Proc. of 25th STOC, 1993, pp. 268–277.
    • (1993) Proc. of 25Th STOC , pp. 268-277
    • Koller, D.1    Megiddo, N.2
  • 21
    • 84894203891 scopus 로고
    • A Time-Randomness Tradeoff for Oblivious Routing
    • D. Krizanc, D. Peleg, and E. Upfal, “A Time-Randomness Tradeoff for Oblivious Routing”, Proc. of 20th STOC, 1988, pp. 93–102.
    • (1988) Proc. of 20Th STOC , pp. 93-102
    • Krizanc, D.1    Peleg, D.2    Upfal, E.3
  • 22
    • 0002365530 scopus 로고
    • Privacy and Communication Complexity
    • May
    • E. Kushilevitz, “Privacy and Communication Complexity”, FOCS 89, and SIAM Jour. on Disc. Math., Vol. 5, No. 2, May 1992, pp. 273–284.
    • (1992) FOCS 89, and SIAM Jour. on Disc. Math , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 23
    • 0027641832 scopus 로고
    • Small-Bias Probability Spaces: Efficient Constructions and Applications
    • J. Naor, and M. Naor, “Small-Bias Probability Spaces: Efficient Constructions and Applications”, STOC 90, and SIAM J. on Computing, Vol 22, No. 4, 1993, pp. 838–856.
    • (1993) STOC 90, and SIAM J. on Computing , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 24
    • 0025152619 scopus 로고
    • Pseudorandom Generator for Space Bounded Computation
    • N. Nisan, “Pseudorandom Generator for Space Bounded Computation”, Proc. of 22nd STOC, 1990, pp. 204–212.
    • (1990) Proc. of 22Nd STOC , pp. 204-212
    • Nisan, N.1
  • 25
    • 85029615997 scopus 로고
    • Memory vs. Randomization in On-Line Algorithms
    • P. Raghavan, and M. Snir, “Memory vs. Randomization in On-Line Algorithms”, Proc. of 16th ICALP, 1989, pp. 687–703.
    • (1989) Proc. of 16Th ICALP , pp. 687-703
    • Raghavan, P.1    Snir, M.2
  • 26
    • 0026977180 scopus 로고
    • Sample Spaces Uniform on Neighborhoods
    • L. J. Schulman, “Sample Spaces Uniform on Neighborhoods”, Proc. of 24th STOC, 1992, pp. 17–25.
    • (1992) Proc. of 24Th STOC , pp. 17-25
    • Schulman, L.J.1
  • 27
    • 0022252339 scopus 로고
    • Random Polynomial Time is Equal to Slightly-Random Polynomial Time
    • U. Vazirani, and V. Vazirani, “Random Polynomial Time is Equal to Slightly-Random Polynomial Time”, Proc. of 26th FOCS, 1985, pp. 417–428.
    • (1985) Proc. of 26Th FOCS , pp. 417-428
    • Vazirani, U.1    Vazirani, V.2
  • 28
    • 0020301290 scopus 로고
    • Theory and Applications of Trapdoor Functions
    • A. C. Yao, “Theory and Applications of Trapdoor Functions” Proc. of 23rd FOCS, 1982, pp. 80–91.
    • (1982) Proc. of 23Rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 29
    • 0026372370 scopus 로고
    • Simulating BPP Using a General Weak Random Source
    • D. Zuckerman, “Simulating BPP Using a General Weak Random Source” Proc. of 32nd FOCS, 1991, pp. 79–89.
    • (1991) Proc. of 32Nd FOCS , pp. 79-89
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.