메뉴 건너뛰기




Volumn , Issue , 2003, Pages 428-437

Separating the power of monotone span programs over different fields

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN ALGEBRA; CRYPTOGRAPHY; MATHEMATICAL MODELS; MATRIX ALGEBRA; POLYNOMIALS; VECTORS;

EID: 0345412672     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (26)
  • 2
    • 0021388907 scopus 로고
    • On computing the determinant in small parallel time using a small number of processors
    • S. J. Berkowitz. On computing the determinant in small parallel time using a small number of processors. Inform. Process. Lett., 18:147-150, 1984.
    • (1984) Inform. Process. Lett. , vol.18 , pp. 147-150
    • Berkowitz, S.J.1
  • 5
    • 0040113669 scopus 로고    scopus 로고
    • Superpolynomial lower bounds for monotone span programs
    • L. Babai, A. Gál, and A. Wigderson. Superpolynomial lower bounds for monotone span programs. Combinatorica, 19(3):301-319, 1999.
    • (1999) Combinatorica , vol.19 , Issue.3 , pp. 301-319
    • Babai, L.1    Gál, A.2    Wigderson, A.3
  • 6
    • 0033350254 scopus 로고    scopus 로고
    • Random CNF's are hard for the polynomial calculus
    • E. Ben-Sasson and R. Impagliazzo. Random CNF's are Hard for the Polynomial Calculus. In 40th FOCS, pages 415-421, 1999.
    • (1999) 40th FOCS , pp. 415-421
    • Ben-Sasson, E.1    Impagliazzo, R.2
  • 9
    • 84968516134 scopus 로고
    • On a theory of computation and complexity over the real numbers; NP completeness, recursive functions and universal machines
    • L. Blum, M. Shub, and S. Smale. On a theory of computation and complexity over the real numbers; NP completeness, recursive functions and universal machines. Bulletin of the AMS (new series), 21, (1);1-46, 1989.
    • (1989) Bulletin of the AMS (New Series) , vol.21 , Issue.1 , pp. 1-46
    • Blum, L.1    Shub, M.2    Smale, S.3
  • 10
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • In B. Preneel, editor; Springer
    • R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 316-334. Springer, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000, Volume 1807 of LNCS , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 11
    • 0344362295 scopus 로고    scopus 로고
    • On relations between counting communication complexity classes
    • To appear. Prelimenary version: STACS '92
    • C. Damm, M. Krause, C. Meinel, and S. Waack. On relations between counting communication complexity classes. J. of Computer and System Sciences, 2003. To appear. Prelimenary version: STACS '92.
    • (2003) J. of Computer and System Sciences
    • Damm, C.1    Krause, M.2    Meinel, C.3    Waack, S.4
  • 12
    • 0031623892 scopus 로고    scopus 로고
    • A characterization of span program size and improved lower bounds for monotone span programs
    • A. Gál. A characterization of span program size and improved lower bounds for monotone span programs. In 30th STOC, pages 429-437, 1998.
    • (1998) 30th STOC , pp. 429-437
    • Gál, A.1
  • 14
    • 0023543848 scopus 로고
    • Secret sharing schemes realizing general access structure
    • Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1):15-20, 1993
    • M. Ito, A. Saito, and T. Nishizeki Secret sharing schemes realizing general access structure. In Proc. of the IEEE Global Telecommunication Conf., Globecom 87, pages 99-102, 1987 Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1):15-20, 1993.
    • (1987) Proc. of the IEEE Global Telecommunication Conf., Globecom 87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 18
    • 84939715814 scopus 로고
    • Las vegas is better than determinism in vlsi and distributed computing
    • K. Mehlhorn and E. M. Schmidt Las vegas is better than determinism in vlsi and distributed computing. In Proc. of the 14th STOC, pages 330-337, 1982.
    • (1982) Proc. of the 14th STOC , pp. 330-337
    • Mehlhorn, K.1    Schmidt, E.M.2
  • 19
    • 51249173165 scopus 로고
    • A fast parallel algorithm to compute the rank of a matrix over an arbitrary field
    • K. Mulmuley A fast parallel algorithm to compute the rank of a matrix over an arbitrary field. Combinatorica, 7:101-104, 1987.
    • (1987) Combinatorica , vol.7 , pp. 101-104
    • Mulmuley, K.1
  • 20
    • 84957653598 scopus 로고    scopus 로고
    • Distributed pseudo-random functions and KDCs
    • M. Naor, B. Pinkas, and O. Reingold Distributed pseudo-random functions and KDCs. LNCS, 1592:327-337, 1999.
    • (1999) LNCS , vol.1592 , pp. 327-337
    • Naor, M.1    Pinkas, B.2    Reingold, O.3
  • 22
    • 0011933971 scopus 로고
    • Applications of matrix methods to the theory of lower bounds in computational complexity
    • A. A. Razborov. Applications of matrix methods to the theory of lower bounds in computational complexity. Combinatorica, 10(1):81-93, 1990.
    • (1990) Combinatorica , vol.10 , Issue.1 , pp. 81-93
    • Razborov, A.A.1
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 24
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control and their application
    • In G. J. Simmons, editor; IEEE Press
    • G. J. Simmons. An introduction to shared secret and/or shared control and their application. In G. J. Simmons, editor, Contemporary Cryptology, The Science of Information Integrity, pages 441-497 IEEE Press, 1992.
    • (1992) Contemporary Cryptology, The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 25
    • 0023570259 scopus 로고
    • Algebraic methods in the theory of lower bounds for boolean circuit complexity
    • R. Smolensky. Algebraic methods in the theory of lower bounds for boolean circuit complexity. In Proceedings of the 19th STOC, pages 77-82, 1987.
    • (1987) Proceedings of the 19th STOC , pp. 77-82
    • Smolensky, R.1
  • 26
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. Stinson An explication of secret sharing schemes. Designs, Codes and Cryptography, 2:357-390, 1992.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.