메뉴 건너뛰기




Volumn , Issue , 2007, Pages 430-439

Low-end uniform hardness vs. randomness tradeoffs for AM

Author keywords

Arthur Merlin games; Derandomization; Hardness vs. randomness tradeoff; Hitting set generator

Indexed keywords

ARTHUR-MERLIN GAMES; DERANDOMIZATION; HITTING-SET GENERATORS; OPTIMAL TRADEOFFS;

EID: 35448955268     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250790.1250854     Document Type: Conference Paper
Times cited : (10)

References (33)
  • 2
  • 3
    • 0002771903 scopus 로고
    • Nondeterininistic exponential time has two-prover interactive protocols
    • L. Babai, L. Fortnow, and C. Lund. Nondeterininistic exponential time has two-prover interactive protocols. Computational Complexity, 1(1):3-40, 1991.
    • (1991) Computational Complexity , vol.1 , Issue.1 , pp. 3-40
    • Babai, L.1    Fortnow, L.2    Lund, C.3
  • 4
    • 0001338853 scopus 로고
    • BPP has subexponential time simulations unless EXPTIME has publishable proofs
    • L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Computational Complexity, 3(4):307-318, 1993.
    • (1993) Computational Complexity , vol.3 , Issue.4 , pp. 307-318
    • Babai, L.1    Fortnow, L.2    Nisan, N.3    Wigderson, A.4
  • 5
    • 0002665938 scopus 로고    scopus 로고
    • Hiding instances in multioracle queries
    • D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In Choffrut and Lengauer [8], pages 37-48.
    • Choffrut and Lengauer , vol.8 , pp. 37-48
    • Beaver, D.1    Feigenbaum, J.2
  • 6
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • M. Blum and S. Kannan. Designing programs that check their work. Journal of the ACM, 42(1):269-291, 1995.
    • (1995) Journal of the ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 7
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Nov
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, Nov. 1984.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 9
    • 33748103563 scopus 로고
    • Some improvements to total degree tests
    • K. Friedl and M. Sudan. Some improvements to total degree tests. In ISTCS, pages 190-198, 1995.
    • (1995) ISTCS , pp. 190-198
    • Friedl, K.1    Sudan, M.2
  • 10
    • 35448992038 scopus 로고    scopus 로고
    • O. Goldreich. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Algorithms and Combinatorics, 1998.
    • O. Goldreich. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Algorithms and Combinatorics, 1998.
  • 11
    • 4744337602 scopus 로고    scopus 로고
    • Uniform hardness versus randomness tradeoffs for Arthur-Merlin games
    • D. Gutfreund, R. Shaltiel, and A. Ta-Shma. Uniform hardness versus randomness tradeoffs for Arthur-Merlin games. Computational Complexity, 12(3-4):85-130, 2003.
    • (2003) Computational Complexity , vol.12 , Issue.3-4 , pp. 85-130
    • Gutfreund, D.1    Shaltiel, R.2    Ta-Shma, A.3
  • 16
    • 33847321516 scopus 로고    scopus 로고
    • Reducing the seed length in the Nisan-Wigderson generator
    • To appear in
    • R. Impagliazzo, R. Shaltiel, and A. Wigderson. Reducing the seed length in the Nisan-Wigderson generator. To appear in Combinatorica, 2006.
    • (2006) Combinatorica
    • Impagliazzo, R.1    Shaltiel, R.2    Wigderson, A.3
  • 20
    • 15244352005 scopus 로고    scopus 로고
    • Derandomizing polynomial identity tests means proving circuit lower bounds
    • V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. Computational Complexity, 13(1-2):1-46, 2004.
    • (2004) Computational Complexity , vol.13 , Issue.1-2 , pp. 1-46
    • Kabanets, V.1    Impagliazzo, R.2
  • 21
    • 0036588881 scopus 로고    scopus 로고
    • Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses
    • Oct
    • A. R. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. SIAM Journal on Computing, 31(5):1501-1526, Oct. 2002.
    • (2002) SIAM Journal on Computing , vol.31 , Issue.5 , pp. 1501-1526
    • Klivans, A.R.1    van Melkebeek, D.2
  • 22
    • 35448988434 scopus 로고    scopus 로고
    • Efficient checking of computations
    • R. J. Lipton. Efficient checking of computations. In Choffrut and Lengauer [8], pages 207-215.
    • Choffrut and Lengauer , vol.8 , pp. 207-215
    • Lipton, R.J.1
  • 23
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. J. Cryptology, 17(1):27-42, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 27-42
    • Lu, C.-J.1
  • 30
    • 0142027847 scopus 로고    scopus 로고
    • Pseudo-random generators for all hardnesses
    • C. Umans. Pseudo-random generators for all hardnesses. Journal of Computer and System Sciences, 67:419-440, 2003.
    • (2003) Journal of Computer and System Sciences , vol.67 , pp. 419-440
    • Umans, C.1
  • 31
    • 26944474386 scopus 로고    scopus 로고
    • Reconstructive dispersers and hitting set generators
    • C. Umans. Reconstructive dispersers and hitting set generators. In APPROX-RANDOM, pages 460-471, 2005.
    • (2005) APPROX-RANDOM , pp. 460-471
    • Umans, C.1
  • 32
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptology, 17(1):43-77, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.