Protocols for secure computations
AC Yao - 23rd annual symposium on foundations of computer …, 1982 - ieeexplore.ieee.org
The author investigates the following problem: Suppose m people wish to compute the
value of a function f(x 1 , x 2 , x 3 , ..., x m ), which is an integer-valued function of m integer …
value of a function f(x 1 , x 2 , x 3 , ..., x m ), which is an integer-valued function of m integer …
How to generate and exchange secrets
ACC Yao - 27th annual symposium on foundations of computer …, 1986 - ieeexplore.ieee.org
In this paper we introduce a new tool for controlling the knowledge transfer process in
cryptographic protocol design. It is applied to solve a general class of problems which include …
cryptographic protocol design. It is applied to solve a general class of problems which include …
Theory and application of trapdoor functions
AC Yao - 23rd Annual Symposium on Foundations of …, 1982 - ieeexplore.ieee.org
The purpose of this paper is to introduce a new information theory and explore its appplications.
Using modern computational complexity, we study the notion of information that can be …
Using modern computational complexity, we study the notion of information that can be …
On the security of public key protocols
Recently the use of public key encryption to provide secure network communication has
received considerable attention. Such public key systems are usually effective against passive …
received considerable attention. Such public key systems are usually effective against passive …
Some complexity questions related to distributive computing (preliminary report)
ACC Yao - Proceedings of the eleventh annual ACM symposium …, 1979 - dl.acm.org
Let M = {0, 1, 2, ..., m—1} , N = {0, 1, 2,..., n—1} , and f:M × N → {0, 1} a Boolean-valued function.
We will be interested in the following problem and its related questions. Let i ε M, j ε N be …
We will be interested in the following problem and its related questions. Let i ε M, j ε N be …
Probabilistic computations: Toward a unified measure of complexity
ACC Yao - 18th Annual Symposium on Foundations of Computer …, 1977 - computer.org
This paper proposes a novel common subgraph extraction algorithm which aims to minimize
the total number of gates (reconfiguration area overhead) involved in implementing …
the total number of gates (reconfiguration area overhead) involved in implementing …
On Constructing Minimum Spanning Trees in k-Dimensional Spaces and Related Problems
ACC Yao - SIAM Journal on Computing, 1982 - SIAM
The problem of finding a minimum spanning tree connecting n points in a k-dimensional space
is discussed under three common distance metrics: Euclidean, rectilinear, and $L_\infty $…
is discussed under three common distance metrics: Euclidean, rectilinear, and $L_\infty $…
Separating the polynomial-time hierarchy by oracles
ACC Yao - 26th Annual Symposium on Foundations of …, 1985 - ieeexplore.ieee.org
We present exponential lower bounds on the size of depth-k Boolean circuits for computing
certain functions. These results imply that there exists an oracle set A such that, relative to A, …
certain functions. These results imply that there exists an oracle set A such that, relative to A, …
Storing a sparse table
The problem of storing and searching large sparse tables is ubiquitous in computer science.
The standard technique for storing such tables is hashing, but hashing has poor worst-case …
The standard technique for storing such tables is hashing, but hashing has poor worst-case …
Lower bounds by probabilistic arguments
AC Yao - 24th Annual Symposium on Foundations of …, 1983 - ieeexplore.ieee.org
The purpose of this paper is to resolve several open problems in the current literature on
Boolean circuits, communication complexity, and hashing functions. These lower bound results …
Boolean circuits, communication complexity, and hashing functions. These lower bound results …