Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/62212acmconferencesBook PagePublication PagesstocConference Proceedingsconference-collections
STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computing
ACM1988 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
STOC88: 1988 Symposium on the Theory of Computing Chicago Illinois USA May 2 - 4, 1988
ISBN:
978-0-89791-264-8
Published:
01 January 1988
Sponsors:

Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Article
Free
Completeness theorems for non-cryptographic fault-tolerant distributed computation

Every function of n inputs can be efficiently computed by a complete network of n processors in such a way that:

  • If no faults occur, no set of size t < n/2 of players gets any additional information (other than the function value),

  • Even if Byzantine ...

Article
Free
Multiparty unconditionally secure protocols

Under the assumption that each pair of participants can communicate secretly, we show that any reasonable multiparty protocol can be achieved if at least 2n/3 of the participants are honest. The secrecy achieved is unconditional. It does not rely on any ...

Article
Free
Founding crytpography on oblivious transfer

Suppose your netmail is being erratically censored by Captain Yossarian. Whenever you send a message, he censors each bit of the message with probability 1/2, replacing each censored bit by some reserved character. Well versed in such concepts as ...

Article
Free
How to sign given any trapdoor function

We present a digital signature scheme which combines high security with the property of being based on a very general assumption: the existence of trapdoor permutations. Previous signature schemes with comparable levels of security were based on ...

Article
Free
A tradeoff between space and efficiency for routing tables

Two conflicting goals play a crucial role in the design of routing schemes for communication networks. A routing scheme should use as short as possible paths for routing messages in the network, while keeping the routing information stored in the ...

Article
Free
Reasoning about knowledge and time in asynchronous systems

We investigate the complexity of reasoning about knowledge and time, with emphasis on the case of asynchronous time. We show that in the case of no forgetting (Ladner and Reif's Tree Logic of Protocols, TLP) the validity problem is complete for ...

Article
Free
Article
Free
Toward a non-atomic era: l-exclusion as a test case

Most of the research in concurrency control has been based on the existence of strong synchronization primitives such as test and set. Following Lamport, recent research promoting the use of weaker primitives, “safe” rather than “atomic,” has resulted ...

Article
Free
A time-randomness tradeoff for oblivious routing

Three parameters characterize the performance of a probabilistic algorithm: T, the runtime of the algorithm; Q, the probability that the algorithm fails to complete the computation in the first T steps and R, the amount of randomness used by the ...

Article
Free
Non-interactive zero-knowledge and its applications

We show that interaction in any zero-knowledge proof can be replaced by sharing a common, short, random string. We use this result to construct the first public-key cryptosystem secure against chosen ciphertext attack.

Article
Free
Multi-prover interactive proofs: how to remove intractability assumptions

Quite complex cryptographic machinery has been developed based on the assumption that one-way functions exist, yet we know of only a few possible such candidates. It is important at this time to find alternative foundations to the design of secure ...

Article
Free
A knowledge-based analysis of zero knowledge

While the intuition underlying a zero knowledge proof system [GMR85] is that no “knowledge” is leaked by the prover to the verifier, researchers are just beginning to analyze such proof systems in terms of formal notions of knowledge. In this paper, we ...

Article
Free
Optimal algorithms for Byzantine agreement

We exhibit randomized Byzantine agreement (BA) algorithms achieving optimal running time and fault tolerance against all types of adversaries ever considered in the literature. Our BA algorithms do not require trusted parties, preprocessing, or non-...

    Article
    Free
    On different modes of communication

    We compare the communication complexity of discrete functions under different modes of computation, unifying and extending several known models. Protocols can be deterministic, nondeterministic or probabilistic and in the last case the error probability ...

    Article
    Free
    Virtual memory algorithms
    Article
    Free
    On the communication complexity of graph properties

    We prove θ(n log n) bounds for the deterministic 2-way communication complexity of the graph properties CONNECTIVITY, s-t-CONNECTIVITY and BIPARTITENESS (for arbitrary partitions of the variables into two sets of equal size). The proofs are based on ...

    Article
    Free
    Article
    Free
    Energy consumption in VLSI circuits

    We study energy consumption in CMOS-style VLSI circuits, where a wire of length / consumes energy Θ(l)when switching. Three model are considered: the uniswitch model where a wire is assumed to switch at most once if the input changes, the multiswitch ...

    Article
    Free
    Random instances of a graph coloring problem are hard

    NP-complete problems should be hard on some (may be extremely rare) instances. But on generic instances many such problems (especially related to random graphs) have been proven easy. We show the intractability of random instances of a graph coloring ...

    Article
    Free
    Expressing combinatorial optimization problems by linear programs
    Article
    Free
    Optimization, approximation, and complexity classes

    We define a natural variant of NP, MAX NP, and also a subclass called MAX SNP. These are classes of optimization problems, and in fact contain several natural, well-studied ones. We show that problems in these classes can be approximated with some ...

    Article
    Free
    Conductance and the rapid mixing property for Markov chains: the approximation of permanent resolved

    The permanent of an n x n matrix A with 0-1 entries aij is defined by per (A) = Σ/σ Π/n-1/i=ο aiσ(i), where the sum is over all permutations σ of [n] = {0, …, n - 1}. Evaluating per (A) is equivalent to counting perfect matchings (1-factors) in the ...

    Article
    Free
    Relativized polynomial time hierarchies having exactly K levels
    Article
    Free
    Computing algebraic formulas with a constant number of registers

    We show that, over an arbitrary ring, the functions computed by polynomial-size algebraic formulas are also computed by polynomial-length algebraic straight-line programs which use only 3 registers (or 4 registers, depending on some definitions). We ...

    Article
    Free
    On the power of white pebbles

    We construct a family (Gp | p) of directed acyclic graphs such that any black pebble strategy for Gp requires p2 pebbles whereas 3p+1 pebbles are sufficient when white pebbles are allowed.

    Article
    Free
    Learning in the presence of malicious errors
    Article
    Free
    Nondeterministic linear tasks may require substantially nonlinear deterministic time in the case of sublinear work space

    Log-size Parabolic Clique Problem is a version of Clique Problem solvable in linear time by a log-space nondeterministic Turning machine. However, no deterministic machine (in a very general sense of this term) with sequential-access read-only input ...

    Article
    Free
    A randomized parallel branch-and-bound procedure

    We present a universal randomized method called Local Best-First Search for parallelizing sequential branch-and-bound algorithms. The method executes on a message-passing multiprocessor system, and requires no global data structures or complex ...

    Article
    Free
    A deterministic algorithm for sparse multivariate polynomial interpolation

    An efficient deterministic polynomial time algorithm is developed for the sparse polynomial interpolation problem. The number of evaluations needed by this algorithm is very small. The algorithm also has a simple NC implementation.

    Article
    Free
    Randomized algorithms and pseudorandom numbers

    Randomized algorithms are analyzed as if unlimited amounts of perfect randomness were available, while pseudorandom number generation is usually studied from the perspective of cryptographic security. Bach recently proposed studying the interaction ...

    Contributors
    • The University of Chicago

    Index Terms

    1. Proceedings of the twentieth annual ACM symposium on Theory of computing

      Recommendations

      Acceptance Rates

      STOC '88 Paper Acceptance Rate 53 of 192 submissions, 28%;
      Overall Acceptance Rate 1,469 of 4,586 submissions, 32%
      YearSubmittedAcceptedRate
      STOC '153479327%
      STOC '143199129%
      STOC '1336010028%
      STOC '113048428%
      STOC '083258025%
      STOC '032708030%
      STOC '022879132%
      STOC '012308336%
      STOC '001828547%
      STOC '981697544%
      STOC '972117536%
      STOC '962017437%
      STOC '891965629%
      STOC '881925328%
      STOC '871655030%
      STOC '801254738%
      STOC '791113733%
      STOC '781203832%
      STOC '77873136%
      STOC '76833036%
      STOC '75873136%
      STOC '74953537%
      STOC '71502346%
      STOC '70702739%
      Overall4,5861,46932%