Sciweavers

8431 search results - page 1548 / 1687
» Algorithmically Independent Sequences
Sort
View
STOC
2006
ACM
120views Algorithms» more  STOC 2006»
15 years 10 months ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majori...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
15 years 10 months ago
The complexity of agreement
A celebrated 1976 theorem of Aumann asserts that honest, rational Bayesian agents with common priors will never "agree to disagree": if their opinions about any topic ar...
Scott Aaronson
STOC
2005
ACM
96views Algorithms» more  STOC 2005»
15 years 10 months ago
Every monotone graph property is testable
A graph property is called monotone if it is closed under taking (not necessarily induced) subgraphs (or, equivalently, if it is closed under removal of edges and vertices). Many ...
Noga Alon, Asaf Shapira
STOC
2004
ACM
153views Algorithms» more  STOC 2004»
15 years 10 months ago
Bounded-concurrent secure multi-party computation with a dishonest majority
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number of concurrent executions, regardless of the number ...
Rafael Pass
98
Voted
STOC
2003
ACM
124views Algorithms» more  STOC 2003»
15 years 10 months ago
Extractors: optimal up to constant factors
This paper provides the first explicit construction of extractors which are simultaneously optimal up to constant factors in both seed length and output length. More precisely, fo...
Chi-Jen Lu, Omer Reingold, Salil P. Vadhan, Avi Wi...
« Prev « First page 1548 / 1687 Last » Next »