Noncryptographic Selection Protocols ( Extended
نویسنده
چکیده
Selection tasks generalize some well studied problems, such as collective coin flipping and leader election. We present new selection protocols in the full information model, and new negative results. In particular, when there are (1 + δ)n/2 good players, we show a protocol that chooses a good leader with probability Ω(δ), and show that every leader election protocol has success probability O(δ1− ), for every > 0. Previously known protocols for this problem have success probability that is exponentially small in 1/δ, and no nontrivial upper bounds on the success probability were known.
منابع مشابه
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for `-bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communication-efficient (2, 1)-CPIR). BddCpir is the first CPIR protocol where server’s online computation depends substantially on the concrete database. We then show that (a) for reasonably small values of `, BddCpir is guar...
متن کاملEnsemble Classification and Extended Feature Selection for Credit Card Fraud Detection
Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملOMNeT++ based Opportunistic Routing Protocols Simulation: A Framework
This paper describes a framework for simulating opportunistic routing protocols in the INETMANET framework of OMNeT++. The proposed modules adopt an abstraction of the generic functions of the most representative opportunistic routing algorithms. The main contribution is an OMNeT++ modeling architecture that could be extended to implement different opportunistic routing schemes. Our work provid...
متن کاملExtended MULTIMOORA method based on Shannon entropy weight for materials selection
Selection of appropriate material is a crucial step in engineering design and manufacturing process. Without a systematic technique, many useful engineering materials may be ignored for selection. The category of multiple attribute decision-making (MADM) methods is an effective set of structured techniques. Having uncomplicated assumptions and mathematics, the MULTIMOORA method as an MADM appro...
متن کامل