On the Number of Random Bits in Totally Private Computation
暂无分享,去创建一个
[1] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[2] Eyal Kushilevitz. Privacy and Communication Complexity , 1992, SIAM J. Discret. Math..
[3] Eyal Kushilevitz,et al. A Communication-Privacy Tradeoff for Modular Addition , 1993, Inf. Process. Lett..
[4] Eli Upfal,et al. A time-randomness tradeoff for oblivious routing , 1988, STOC '88.
[5] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[6] Russell Impagliazzo,et al. How to recycle random bits , 1989, 30th Annual Symposium on Foundations of Computer Science.
[7] Kurt Mehlhorn,et al. A Time-Randomness Tradeoff for Communication Complexity , 1990, WDAG.
[8] Prabhakar Raghavan,et al. Memory versus randomization in on-line algorithms , 1994, IBM J. Res. Dev..
[9] Eyal Kushilevitz,et al. A Randomnesss-Rounds Tradeoff in Private Computation , 1994, CRYPTO.
[10] David Zuckerman,et al. Simulating BPP using a general weak random source , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.
[11] Andrew Chi-Chih Yao,et al. The complexity of nonuniform random number generation , 1976 .
[12] Prabhakar Raghavan,et al. Memory Versus Randomization in On-line Algorithms (Extended Abstract) , 1989, ICALP.
[13] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[14] Eyal Kushilevitz,et al. A Zero-One Law for Boolean Privacy , 1991, SIAM J. Discret. Math..
[15] Aravind Srinivasan,et al. Randomness-optimal unique element isolation, with applications to perfect matching and related problems , 1993, STOC '93.