Threshold Computation and Cryptographic Security
DOI10.1137/S0097539792240467zbMATH Open0868.68056OpenAlexW2020029222WikidataQ30053119 ScholiaQ30053119MaRDI QIDQ4337431FDOQ4337431
Authors: Yenjo Han, Lane A. Hemaspaandra, Thomas Thierauf
Publication date: 17 August 1997
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/s0097539792240467
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15)
Cited In (17)
- SELF-SPECIFYING MACHINES
- Quantum computing, postselection, and probabilistic polynomial-time
- Lower bounds and the hardness of counting properties
- Rectangles are nonnegative juntas
- Computational complexity of the landscape. I.
- The robustness of LWPP and WPP, with an application to graph reconstruction
- The landscape of communication complexity classes
- The consequences of eliminating NP solutions
- Complexity results in graph reconstruction
- Languages polylog-time reducible to dot-depth 1/2
- Query-monotonic Turing reductions
- Error-bounded probabilistic computations between MA and AM
- Relativized worlds with an infinite hierarchy
- Commuting quantum circuits and complexity of Ising partition functions
- Computational tameness of classical non-causal models
- Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
- PP is closed under intersection
This page was built for publication: Threshold Computation and Cryptographic Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4337431)