Cited By
View all- Couteau GRosén A(2022)Random Sources in Private ComputationAdvances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22963-3_15(443-473)Online publication date: 5-Dec-2022
We consider the amount of randomness necessary in information-theoretic private protocols. We prove that at least Ω(log n) random bits are necessary for the t-private computation of the function xor by n players, for any t ≥ 2. In view of the upper ...
We consider the amount of randomness necessary in information-theoretic private protocols. We prove that at least $\Omega(\log n)$ random bits are necessary for the t-private computation of the function {\tt xor} by n players for any $t \geq 2$. In view ...
Society for Industrial and Applied Mathematics
United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in