메뉴 건너뛰기




Volumn , Issue , 2008, Pages 654-663

Network extractor protocols

Author keywords

[No Author keywords available]

Indexed keywords

BYZANTINE AGREEMENTS; BYZANTINE FAULTS; COMPUTATIONAL SETTINGS; DIFFIE-HELLMAN; LEADER ELECTIONS; LINEAR FRACTIONS; MIN ENTROPIES; TRAPDOOR PERMUTATIONS;

EID: 57949107508     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2008.73     Document Type: Conference Paper
Times cited : (30)

References (28)
  • 1
    • 0027576476 scopus 로고
    • Coin-flipping games immune against linear-sized coalitions
    • Apr
    • N. Alon and M. Naor. Coin-flipping games immune against linear-sized coalitions. SIAM Journal on Computing, 22(2):403-417, Apr. 1993.
    • (1993) SIAM Journal on Computing , vol.22 , Issue.2 , pp. 403-417
    • Alon, N.1    Naor, M.2
  • 5
    • 0033700150 scopus 로고    scopus 로고
    • Perfect-information leader election with optimal resilience
    • R. B. Boppana and B. O. Narayanan. Perfect-information leader election with optimal resilience. SIAM J. Comput, 29(4):1304-1320, 2000.
    • (2000) SIAM J. Comput , vol.29 , Issue.4 , pp. 1304-1320
    • Boppana, R.B.1    Narayanan, B.O.2
  • 6
    • 0842305659 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In CRYPTO '97, pages 455-469, 1997.
    • (1997) CRYPTO '97 , pp. 455-469
    • Canetti, R.1
  • 7
    • 46749095580 scopus 로고    scopus 로고
    • Cryptography from sunspots: How to use an imperfect reference string
    • R. Canetti, R. Pass, and A. Shelat. Cryptography from sunspots: How to use an imperfect reference string. In FOCS'07, pages 249-259, 2007.
    • (2007) FOCS'07 , pp. 249-259
    • Canetti, R.1    Pass, R.2    Shelat, A.3
  • 8
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 9
    • 0008837570 scopus 로고
    • Fast perfect-information leader-election protocols with linear immunity
    • J. Cooper and N. Linial. Fast perfect-information leader-election protocols with linear immunity. Combinatorica, 15(3):319-332, 1995.
    • (1995) Combinatorica , vol.15 , Issue.3 , pp. 319-332
    • Cooper, J.1    Linial, N.2
  • 10
    • 30744451262 scopus 로고    scopus 로고
    • On extracting private randomness over a public channel
    • Y. Dodis and R. Oliveira. On extracting private randomness over a public channel. In RANDOM 2003, pages 252-263, 2003.
    • (2003) RANDOM 2003 , pp. 252-263
    • Dodis, Y.1    Oliveira, R.2
  • 11
    • 17744370165 scopus 로고    scopus 로고
    • On the (im)possibility of cryptography with imperfect randomness
    • Y. Dodis, S. J. Ong, M. Prabhakaran, and A. Sahai. On the (im)possibility of cryptography with imperfect randomness. In FOCS'04 pages 196-205, 2004.
    • (2004) FOCS'04 , pp. 196-205
    • Dodis, Y.1    Ong, S.J.2    Prabhakaran, M.3    Sahai, A.4
  • 12
    • 0036957025 scopus 로고    scopus 로고
    • On the (non)universality of the one-time pad
    • Y. Dodis and J. Spencer. On the (non)universality of the one-time pad. In FOCS'02, pages 376-385, 2002.
    • (2002) FOCS'02 , pp. 376-385
    • Dodis, Y.1    Spencer, J.2
  • 13
    • 0032614490 scopus 로고    scopus 로고
    • Noncryptographic selection protocols
    • U. Feige. Noncryptographic selection protocols. In FOCS'99, pages 142-152, 1999.
    • (1999) FOCS'99 , pp. 142-152
    • Feige, U.1
  • 14
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC '87, pages 218-229, 1987.
    • (1987) STOC '87 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 38749153587 scopus 로고    scopus 로고
    • Fault-tolerant distributed computing in full-information networks
    • S. Goldwasser, E. Pavlov, and V. Vaikuntanathan. Fault-tolerant distributed computing in full-information networks. In FOCS, pages 15-26, 2006.
    • (2006) FOCS , pp. 15-26
    • Goldwasser, S.1    Pavlov, E.2    Vaikuntanathan, V.3
  • 16
    • 33646397282 scopus 로고    scopus 로고
    • Distributed computing with imperfect randomness
    • DISC 2005, Proceedings, of, Springer
    • S. Goldwasser, M. Sudan, and V. Vaikuntanathan. Distributed computing with imperfect randomness. In DISC 2005, Proceedings, volume 3724 of Lecture Notes in Computer Science, pages 288-302. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3724 , pp. 288-302
    • Goldwasser, S.1    Sudan, M.2    Vaikuntanathan, V.3
  • 17
    • 57949113684 scopus 로고    scopus 로고
    • Fast asynchronous Byzantine agreement and leader election with full information
    • B. Kapron, D. Kempe, V. King, J. Saia, and V. Sanwalani. Fast asynchronous Byzantine agreement and leader election with full information. In SODA'08, pages 1038-1047, 2008.
    • (2008) SODA'08 , pp. 1038-1047
    • Kapron, B.1    Kempe, D.2    King, V.3    Saia, J.4    Sanwalani, V.5
  • 18
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • U. M. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In CRYPTO '97, pages 307-321, 1997.
    • (1997) CRYPTO '97 , pp. 307-321
    • Maurer, U.M.1    Wolf, S.2
  • 19
    • 0012524233 scopus 로고
    • On the impossibility of private key cryptography with weakly random keys
    • J. L. Mclnnes and B. Pinkas. On the impossibility of private key cryptography with weakly random keys. In CRYPTO '90, pages 421-435, 1990.
    • (1990) CRYPTO '90 , pp. 421-435
    • Mclnnes, J.L.1    Pinkas, B.2
  • 21
    • 0028062297 scopus 로고
    • Simple and efficient leader election in the full information model
    • R. Ostrovsky, S. Rajagopalan, and U. Vazirani. Simple and efficient leader election in the full information model. In STOC'94, pages 234-242, 1994.
    • (1994) STOC'94 , pp. 234-242
    • Ostrovsky, R.1    Rajagopalan, S.2    Vazirani, U.3
  • 22
    • 33748105465 scopus 로고    scopus 로고
    • Extractors for a constant number of polynomially small min-entropy independent sources
    • A. Rao. Extractors for a constant number of polynomially small min-entropy independent sources. In STOC'06, 2006.
    • (2006) STOC'06
    • Rao, A.1
  • 23
    • 0035733591 scopus 로고    scopus 로고
    • Perfect information leader election in log* n+O (1) rounds
    • A. Russell and D. Zuckerman. Perfect information leader election in log* n+O (1) rounds. Journal of Computer and System Sciences, 63(4):612-626, 2001.
    • (2001) Journal of Computer and System Sciences , vol.63 , Issue.4 , pp. 612-626
    • Russell, A.1    Zuckerman, D.2
  • 24
    • 0000827336 scopus 로고
    • A robust noncryptographic protocol for collective coin flipping
    • May
    • M. Saks. A robust noncryptographic protocol for collective coin flipping. SIAM Journal on Discrete Mathematics, 2(2):240-244, May 1989.
    • (1989) SIAM Journal on Discrete Mathematics , vol.2 , Issue.2 , pp. 240-244
    • Saks, M.1
  • 25
    • 0031654488 scopus 로고    scopus 로고
    • Explicit OR-dispersers with polylog degree
    • M. Saks, A. Srinivasan, and S. Zhou. Explicit OR-dispersers with polylog degree. Journal of the ACM, 45:123-154, 1998.
    • (1998) Journal of the ACM , vol.45 , pp. 123-154
    • Saks, M.1    Srinivasan, A.2    Zhou, S.3
  • 26
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • U. V. Vazirani and V. V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In FOCS'85, pages 417-428, 1985.
    • (1985) FOCS'85 , pp. 417-428
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 27
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • D. Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16:367-391, 1996.
    • (1996) Algorithmica , vol.16 , pp. 367-391
    • Zuckerman, D.1
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.