메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 711-720

On the randomness complexity of efficient sampling

Author keywords

Compression; Derandomization; Information theoretic cryptography; Pseudorandom generators; Randomness complexity; Secure computation

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTATION THEORY; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; POLYNOMIALS; STATISTICAL METHODS;

EID: 33748094970     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1132516.1132615     Document Type: Conference Paper
Times cited : (52)

References (39)
  • 1
    • 0001338853 scopus 로고
    • BPP has subexponential time simulations unless EXPTIME has publishable proofs
    • L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Computational Complexity, 3:307-318, 1993.
    • (1993) Computational Complexity , vol.3 , pp. 307-318
    • Babai, L.1    Fortnow, L.2    Nisan, N.3    Wigderson, A.4
  • 3
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In 20th STOC, pages 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput., 13(4):850-864, 1984.
    • (1984) SIAM J. Comput. , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 5
    • 84958034013 scopus 로고
    • On the number of random bits in totally private computation
    • C. Blundo, A. D. Santis, G. Persiano, and U. Vaccaro. On the number of random bits in totally private computation. In 22nd ICALP, pages 171-182, 1995.
    • (1995) 22nd ICALP , pp. 171-182
    • Blundo, C.1    Santis, A.D.2    Persiano, G.3    Vaccaro, U.4
  • 7
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In 20th STOC, pages 11-19, 1988.
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 8
    • 0037769916 scopus 로고    scopus 로고
    • Lower bounds on the amount of randomness in private computation
    • A. Gal and A. Rosen. Lower bounds on the amount of randomness in private computation. In 35th STOC, pages 659-666, 2003.
    • (2003) 35th STOC , pp. 659-666
    • Gal, A.1    Rosen, A.2
  • 9
    • 0026170859 scopus 로고
    • Compression and ranking
    • A. V. Goldberg and M. Sipser. Compression and ranking. SIAM J. Comput., 20(3):524-536, 1991.
    • (1991) SIAM J. Comput. , vol.20 , Issue.3 , pp. 524-536
    • Goldberg, A.V.1    Sipser, M.2
  • 11
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. In 21st STOC, pages 25-32, 1989.
    • (1989) 21st STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 14
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 15
    • 33748118109 scopus 로고    scopus 로고
    • On the power of the randomized iterate
    • I. Haitner, D. Harnik, and O. Reingold. On the power of the randomized iterate. ECCC, 2005.
    • (2005) ECCC
    • Haitner, I.1    Harnik, D.2    Reingold, O.3
  • 16
    • 33749556115 scopus 로고    scopus 로고
    • On the compressibility of NP instances and cryptographic applications
    • D. Harnik and M. Naor. On the compressibility of NP instances and cryptographic applications. ECCC, 2006.
    • (2006) ECCC
    • Harnik, D.1    Naor, M.2
  • 17
    • 68549105769 scopus 로고    scopus 로고
    • Pseudorandom generators from one-way functions: A simple construction for any hardness
    • T. Holenstein. Pseudorandom generators from one-way functions: A simple construction for any hardness. In TCC '06, 2006.
    • (2006) TCC '06
    • Holenstein, T.1
  • 18
    • 0029516814 scopus 로고
    • Hard-core distributions for somewhat hard problems
    • R. Impagliazzo. Hard-core distributions for somewhat hard problems. In 36th FOCS, pages 538-545, 1995.
    • (1995) 36th FOCS , pp. 538-545
    • Impagliazzo, R.1
  • 19
    • 23844442856 scopus 로고    scopus 로고
    • In search of an easy witness: Exponential time vs. probabilistic polynomial time
    • R. Impagliazzo, V. Kabanets, and A. Wigderson. In search of an easy witness: Exponential time vs. probabilistic polynomial time. J. Comput. Syst. Sci., 65(4):672-694, 2002.
    • (2002) J. Comput. Syst. Sci. , vol.65 , Issue.4 , pp. 672-694
    • Impagliazzo, R.1    Kabanets, V.2    Wigderson, A.3
  • 20
    • 0028022375 scopus 로고
    • Pseudorandomness for network algorithms
    • R. Impagliazzo, N. Nisan, and A. Wigderson. Pseudorandomness for network algorithms. In 26th STOC, pages 356-364, 1994.
    • (1994) 26th STOC , pp. 356-364
    • Impagliazzo, R.1    Nisan, N.2    Wigderson, A.3
  • 21
    • 0030706544 scopus 로고    scopus 로고
    • P = BPP if e requires exponential circuits: Derandomizing the XOR lemma
    • R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In 29th STOC, pages 220-229, 1997.
    • (1997) 29th STOC , pp. 220-229
    • Impagliazzo, R.1    Wigderson, A.2
  • 22
    • 33748114725 scopus 로고    scopus 로고
    • On the hardness of information-theoretic multiparty computation
    • Y. Ishai and E. Kushilevitz. On the hardness of information-theoretic multiparty computation. In EUROCRYPT '04, pages 439-455, 2004.
    • (2004) EUROCRYPT '04 , pp. 439-455
    • Ishai, Y.1    Kushilevitz, E.2
  • 23
    • 24144497043 scopus 로고    scopus 로고
    • Sufficient conditions for collision-resistant hashing
    • Y. Ishai, E. Kushilevitz, and R. Ostrovsky. Sufficient conditions for collision-resistant hashing. In TCC '05, pages 445-456, 2005.
    • (2005) TCC '05 , pp. 445-456
    • Ishai, Y.1    Kushilevitz, E.2    Ostrovsky, R.3
  • 25
    • 0038107689 scopus 로고    scopus 로고
    • Derandomizing polynomial identity tests means proving circuit lower bounds
    • V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. In 35th STOC, pages 355-364, 2003.
    • (2003) 35th STOC , pp. 355-364
    • Kabanets, V.1    Impagliazzo, R.2
  • 26
    • 0032631765 scopus 로고    scopus 로고
    • Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses
    • A. R. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. In 31st STOC, pages 659-667, 1999.
    • (1999) 31st STOC , pp. 659-667
    • Klivans, A.R.1    Van Melkebeek, D.2
  • 27
    • 0002918554 scopus 로고
    • The complexity of nonuniform random number generation
    • ed. J. Traub
    • D. E. Knuth and A. C. Yao. The complexity of nonuniform random number generation. Algorithms and Complexity, ed. J. Traub, pages 357-428, 1976.
    • (1976) Algorithms and Complexity , pp. 357-428
    • Knuth, D.E.1    Yao, A.C.2
  • 29
    • 0029712050 scopus 로고    scopus 로고
    • Characterizing linear size circuits in terms of privacy
    • E. Kushilevitz, R. Ostrovsky, and A. Rosen. Characterizing linear size circuits in terms of privacy. In 28th STOC, pages 541-550, 1996.
    • (1996) 28th STOC , pp. 541-550
    • Kushilevitz, E.1    Ostrovsky, R.2    Rosen, A.3
  • 30
    • 0027627287 scopus 로고
    • Constant depth circuits, Fourier transform and learnability
    • N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, Fourier transform and learnability. Journal of the ACM, 40(3):607-620, 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.3 , pp. 607-620
    • Linial, N.1    Mansour, Y.2    Nisan, N.3
  • 31
    • 0000947929 scopus 로고
    • Pseudorandom generators for space-bounded computation
    • N. Nisan. Pseudorandom generators for space-bounded computation. Combinatorica, 12(4):449-461, 1992.
    • (1992) Combinatorica , vol.12 , Issue.4 , pp. 449-461
    • Nisan, N.1
  • 33
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, 1996.
    • (1996) J. Comput. Syst. Sci. , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 34
    • 0035175916 scopus 로고    scopus 로고
    • Simple extractors for all min-entropies and a new pseudo-random generator
    • R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudo-random generator. In 42nd FOCS, pages 648-657, 2001.
    • (2001) 42nd FOCS , pp. 648-657
    • Shaltiel, R.1    Umans, C.2
  • 35
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • D. R. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? In EUROCRYPT '98, pages 334-345, 1998.
    • (1998) EUROCRYPT '98 , pp. 334-345
    • Simon, D.R.1
  • 36
    • 0036040280 scopus 로고    scopus 로고
    • Algorithmic derandomization via complexity theory
    • D. Sivakumar. Algorithmic derandomization via complexity theory. In 34th STOC, pages 619-626, 2002.
    • (2002) 34th STOC , pp. 619-626
    • Sivakumar, D.1
  • 37
    • 0035276434 scopus 로고    scopus 로고
    • Pseudorandom generators without the XOR Lemma
    • M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR Lemma. J. Comput. Syst. Sci., 62(2):236-266, 2001.
    • (2001) J. Comput. Syst. Sci. , vol.62 , Issue.2 , pp. 236-266
    • Sudan, M.1    Trevisan, L.2    Vadhan, S.3
  • 38
    • 0036039959 scopus 로고    scopus 로고
    • Pseudo-random generators for all hardnesses
    • C. Umans. Pseudo-random generators for all hardnesses. In 34th STOC, pages 627-634, 2001.
    • (2001) 34th STOC , pp. 627-634
    • Umans, C.1
  • 39
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • A. Yao. Theory and applications of trapdoor functions. In 23rd FOCS, pages 80-91, 1982.
    • (1982) 23rd FOCS , pp. 80-91
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.