A Randomnesss-Rounds Tradeoff in Private Computation
暂无分享,去创建一个
[1] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[2] Nimrod Megiddo,et al. Constructing small sample spaces satisfying given constraints , 1993, SIAM J. Discret. Math..
[3] Matthew K. Franklin,et al. Communication complexity of secure computation (extended abstract) , 1992, STOC '92.
[4] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[5] Russell Impagliazzo,et al. How to recycle random bits , 1989, 30th Annual Symposium on Foundations of Computer Science.
[6] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[7] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[8] Moni Naor,et al. Small-Bias Probability Spaces: Efficient Constructions and Applications , 1993, SIAM J. Comput..
[9] Eli Upfal,et al. A time-randomness tradeoff for oblivious routing , 1988, STOC '88.
[10] Alfredo De Santis,et al. Randomness in Distributed Protocols , 1994 .
[11] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[12] Prabhakar Raghavan,et al. Memory Versus Randomization in On-line Algorithms (Extended Abstract) , 1989, ICALP.
[13] Eyal Kushilevitz,et al. A Zero-One Law for Boolean Privacy , 1991, SIAM J. Discret. Math..
[14] Eyal Kushilevitz,et al. Private computations over the integers , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[15] Noam Nisan,et al. Pseudorandom generators for space-bounded computations , 1990, STOC '90.
[16] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[17] Noga Alon,et al. Simple construction of almost k-wise independent random variables , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[18] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[19] Avi Wigderson,et al. Dispersers, deterministic amplification, and weak random sources , 1989, 30th Annual Symposium on Foundations of Computer Science.
[20] Eyal Kushilevitz,et al. A Communication-Privacy Tradeoff for Modular Addition , 1993, Inf. Process. Lett..
[21] David Zuckerman,et al. Simulating BPP using a general weak random source , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.
[22] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[23] Vijay V. Vazirani,et al. Random polynomial time is equal to slightly-random polynomial time , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[24] Mihir Bellare,et al. Randomness in interactive proofs , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[25] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[26] Eyal Kushilevitz. Privacy and Communication Complexity , 1992, SIAM J. Discret. Math..
[27] Leonard J. Schulman. Sample spaces uniform on neighborhoods , 1992, STOC '92.