F 0 1 2 3 2 N ? 2 2 N ? 1 0 0 0 0 0 0 0 1 1 2 2 2 2 2

نویسنده

  • Z. Galil
چکیده

13 Proof: R private (f) C private (f) since in any protocol the parties send at least one bit per round. On the other hand, for every privately computable function f the bound R private (f) is achieved by the protocol A f. In any round of this protocol the parties send a message with size at most n. (Note that in steps (2a) and (2b) of A f we may save one bit per round by omitting the most signiicant bit which is always '1'). The claim follows. Corollary 8: Randomization does not help to reduce the number of rounds needed in private computations. This is true since the protocol A f is a deterministic protocol. We remark that A f besides being optimal in its rounds complexity, is also optimal in its communication complexity among the deterministic protocols. To prove that we observe that if A is a deterministic protocol then the number of diierent communication strings is equal to the number of leaves in the decomposition tree that corresponds to A. We conclude not only that randomization does not help to compute more functions privately, but also that it does not help to reduce the number of rounds needed in private computations. 5 Discussion As it is pointed out in 8], the characterization of two-party private functions can be used to give necessary conditions for privacy in a multi-party scenario. t-private, for t j N ?1 2 k + 1, if for any partition of the N parties into two sets of participants T and T, where T is of size t, the two-argument function ^ f deened as ^ f(fx i g i2T ; fx i g i2 T) def = f(x 1 ; x 2 ; : : :; x N) is private. Using the above observation and Theorem 1, we get from any such partition a necessary condition for f to be t-private (t j N ?1 2 k + 1). In addition, from any such partition and using Corollary 5, we get lower bounds on the rounds complexity and the communication complexity of computing f t-privately. The problem of giving an exact characterization of the t-private (general) functions, for j N ?1 2 k < t N is still open. 6 Acknowledgments I would like to thank Benny Chor and Oded Goldreich for helpful discussions on the topics of this paper, and Avi …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incorporating Prior Knowledge when Learning Mixtures of Truncated Basis Functions from Data

A quick recall of how of how to do approximations in R n : 0 1 2 3 4 5 0 1 2 3 4 5 0 1 2 3 4 5 We want to approximate the vector f = (3, 2, 5) with A vector along e 1 = (1, 0, 0). A quick recall of how of how to do approximations in R n : 0 1 2 3 4 5 0 1 2 3 4 5 0 1 2 3 4 5 We want to approximate the vector f = (3, 2, 5) with A vector along e 1 = (1, 0, 0). Best choice is f , e 1 · e 1 = (3, 0,...

متن کامل

E:\COURSES(NEW)\NEW QM FILES\QMII\TIME INDEPENDENT PERTURBATION.dvi

" # #$ % $ & &'% ($ &') &*%+ , . &/ 0 &( 1 2 3 % 2 ) . 4/ 5 , 0 6 ) 7% #8 9 : 9 ; (< # ( %= ! " # > ?1% @ %+ , &4 % &4 A ;3 % ( B C #$ D E &*8 $ F G # ($ #4/ H 0 %3 & # 3 #$ 7% ( 0 %. */ 0< #$ & ; (< # 0, 9 3 0 % & B " ! & G 3 & " (I J9 */ K 9 . &D & " (I 7 (8 0, 9 & 1 F G 0 % & ; % # 01 &6$ + # . #$ D & L< 2(% #6 =9 & G 3 =9 ; */ & */ (8 %. & M N # #$ 0 & #'O 7% . 2 D P #4/ H 7% ( 0 ! " # > 2 ...

متن کامل

Equity in scaling up SimCalc: investigating differences in student learning and classroom implementation

Investigating Differences in Student Learning and Classroom Implementation ! "#$#%&!'()*+#,,#-!.'/!/01#$0213(02,-!4#$#%&5$()*+#,,#6)$35*(%! "#))3*2!73#$)(0-!.20!83#9(!.121#!:03;#$)31&-!4<3#$)(06%23,5)=)>5#=>! .>)20!?%<)(0-!:03;#$)31&!(@!A#B2)!21!C>)130-!#%<)(06%23,5>1#B2)5#=>! D3*(,#!.+#*+1%20-!.'/!/01#$0213(02,-!03*(,#5)+#*+1%206)$35*(%! E2$93#!8>00-!'>19#$)!:03;#$)31&-!D#F2$G-!=>006*)5$>19#$)...

متن کامل

On F-squares and their critical sets

We define the notion of critical set of an F-square, following the definition of critical set in latin squares, and then give critical sets for certain classes of F-squares. We also generalise certain results obtained for critical sets of latin squares, and look at minimal such sets. We show that critical sets of F-squares need to be studied as well as critical sets for latin squares as the tec...

متن کامل

Semantic Email: Adding Lightweight Data Manipulation Capabilities to the Email Habitat

! " # %$& !'( ) ! !*+ , . / 0'(1)23 4 )2 / /56 ) 7 3 , 98-2 '(1;: -<=2> 7 = ) ! 7 ?8 "2 @', 7 ! "2 A 1 B "2C !$-$ 1; @ 0 D ! C @E $ 1 ! ; D , %27 B*F !'G 9$-' > H I2 J 8 '(: ) < K+ ! H @'T , = , ' 1 U *V ;1WK, 02 X( 0 N Y * 0' > ) ! Z ($" ! @ # ) G56 ) 7 %5+ ($& @ "2% <! ;[& R 9 087 + *\ 9 0O /...

متن کامل

The inhibition of histaminase by amidines.

In normal Amount Total Error of recovery Method plasma added found (%) Spectrophotometric 079 0-5 1*28 -3-4 1*0 0.4 1*41 +2-5 -1*0 1.0 1*96 -4.0 -0-82 0-7 1-53 +1*4 -0*82 1*2 2*18 -1*7 Photoelectric 076 0 5 1F24 -4 0 -1-03 0-4 1*43 +1'2 -1-03 1.0 2*0 -3*0 -0'84 0 7 1*56 +2-8 -0*84 1*2 2*01 -2.5 Roe & Kuether (1943) -0-72 0 5 1-2 -4 0 -1.0 0.4 1*4 0.0 -1.0 1.0 1*96 -4*0 -0*88 0*7 1*6 +2-8 -0*88 ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992