Sciweavers

727 search results - page 4 / 146
» Private approximation of search problems
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 10 months ago
Authentication from matrix conjugation
Abstract. We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter is equivalen...
Dima Grigoriev, Vladimir Shpilrain
EUROCAST
2009
Springer
179views Hardware» more  EUROCAST 2009»
14 years 4 months ago
New Approximation-Based Local Search Algorithms for the Probabilistic Traveling Salesman Problem
In this paper we present new local search algorithms for the Probabilistic Traveling Salesman Problem (PTSP) using sampling and ad-hoc approximation. These algorithms improve both...
Dennis Weyland, Leonora Bianchi, Luca Maria Gambar...
ECCC
2010
78views more  ECCC 2010»
13 years 10 months ago
PCPs and the Hardness of Generating Synthetic Data
Assuming the existence of one-way functions, we show that there is no polynomial-time, differentially private algorithm A that takes a database D ({0, 1}d )n and outputs a "...
Jonathan Ullman, Salil P. Vadhan
ASIACRYPT
1999
Springer
14 years 2 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
TCC
2012
Springer
218views Cryptology» more  TCC 2012»
12 years 5 months ago
Iterative Constructions and Private Data Release
In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of exis...
Anupam Gupta, Aaron Roth, Jonathan Ullman