Join Our Newsletter

STOC

2009

ACM

9 years 5 months ago
2009

ACM

A system of linear equations in p unknowns Mx = b is said to have the removal property if every set S ⊆ {1, . . . , n} which contains o(np− ) solutions of Mx = b can be turned...

STOC

2009

ACM

9 years 5 months ago
2009

ACM

We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...

STOC

2009

ACM

9 years 5 months ago
2009

ACM

The discrete logarithm problem asks to solve for the exponent x, given the generator g of a cyclic group G and an element h ∈ G such that gx = h. We give the ﬁrst rigorous pro...

STOC

2009

ACM

9 years 11 months ago
2009

ACM

STOC

2009

ACM

9 years 11 months ago
2009

ACM

We consider the following question: given a two-argument boolean function f, represented as an N ? N binary matrix, how hard is to determine the (deterministic) communication comp...

STOC

2009

ACM

9 years 11 months ago
2009

ACM

We describe the first algorithm to compute maximum flows in surface-embedded graphs in near-linear time. Specifically, given a graph embedded on a surface of genus g, with two spe...

STOC

2009

ACM

9 years 11 months ago
2009

ACM

A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...

STOC

2009

ACM

9 years 11 months ago
2009

ACM

We show how to compute the edit distance between two strings of length n up to a factor of 2 ~O( log n) in n1+o(1) time. This is the first sub-polynomial approximation algorithm f...

STOC

2009

ACM

9 years 11 months ago
2009

ACM

The continuous-time query model is a variant of the discrete query model in which queries can be interleaved with known operations (called "driving operations") continuo...

STOC

2009

ACM

9 years 11 months ago
2009

ACM

We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...