Functionally Private Approximations of Negligibly-Biased Estimators
暂无分享,去创建一个
[1] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[2] Joan Feigenbaum,et al. Secure Multiparty Computation of Approximations , 2001, ICALP.
[3] Richard M. Karp,et al. Monte-Carlo algorithms for enumeration and reliability problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[4] Robert Krauthgamer,et al. Private approximation of NP-hard functions , 2001, STOC '01.
[5] K. V. Subrahmanyam,et al. Descriptive Complexity of #P Functions , 1995, J. Comput. Syst. Sci..
[6] S. Janson. Stable distributions , 2011, 1112.0220.
[7] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[8] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[9] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[10] S. Muthukrishnan,et al. Data streams: algorithms and applications , 2005, SODA '03.
[11] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[12] Joe Kilian,et al. Fast Private Norm Estimation and Heavy Hitters , 2008, TCC.
[13] David P. Woodruff,et al. Polylogarithmic Private Approximations and Efficient Matching , 2006, TCC.
[14] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[15] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[16] Noam Nisan,et al. Pseudorandom generators for space-bounded computations , 1990, STOC '90.
[17] J. Spouge. Computation of the gamma, digamma, and trigamma functions , 1994 .
[18] Ping Li,et al. Estimators and tail bounds for dimension reduction in lα (0 < α ≤ 2) using stable random projections , 2008, SODA '08.
[19] Leslie G. Valiant,et al. The Complexity of Enumeration and Reliability Problems , 1979, SIAM J. Comput..