Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A Zero-One Law for Boolean Privacy - MaRDI portal

A Zero-One Law for Boolean Privacy

From MaRDI portal
Publication:5749233

DOI10.1137/0404004zbMath0717.94009OpenAlexW1984332407MaRDI QIDQ5749233

Benny Chor, Eyal Kushilevitz

Publication date: 1991

Published in: SIAM Journal on Discrete Mathematics (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/3f39a74106863f7d09da370bf0a30664367c5286




Related Items

Mhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKPLimits on the usefulness of random oraclesBest possible information-theoretic MPCCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionA discrepancy lower bound for information complexityMathematical problems in cryptologyOn fully secure MPC with solitary outputLower and upper bounds on the randomness complexity of private computations of ANDOn \(d\)-multiplicative secret sharingOptimality of a protocol by Feige-Kilian-Naor for three-party secure computationThe Hardness of Being PrivateCompleteness for symmetric two-party functionalities: revisitedRandom sources in private computationOn perfectly secure two-party computation for symmetric functionalities with correlated randomnessOblivious-transfer complexity of noisy coin-toss via secure zero communication reductionsPrivacy in non-private environmentsOn private computation in incomplete networksCryptography and cryptographic protocolsOn the number of random bits in totally private computationQuantifying the leakage of quantum protocols for classical two-party cryptographyOn communication protocols that compute almost privatelyOT-Combiners via Secure ComputationOn the Communication Complexity of Key-Agreement Protocols.Fooling Pairs in Randomized Communication ComplexityOn Complete Primitives for FairnessFounding Cryptography on Tamper-Proof Hardware TokensProtecting data privacy in private information retrieval schemesSusceptible Two-Party Quantum ComputationsThe privacy of dense symmetric functionsLower and Upper Bounds on the Randomness Complexity of Private Computations of ANDCharacterizing linear size circuits in terms of privacyOn privacy and partition argumentsOn the structure of the privacy hierarchy




This page was built for publication: A Zero-One Law for Boolean Privacy