A three-party communication problem

被引:0
|
作者
Schulman, LJ [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
D O I
10.1006/jcss.1998.1603
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We show an Omega(log log n) lower bound on the deterministic communication complexity of the following problem. Three parties A, B, C are given inputs x, y, z epsilon (Z/2)(n), respectively, subject to the constraint x + y + z = 1(n). The function to be computed is f(x, y, z) = boolean ORi(x(i) boolean AND y(i) boolean AND z(j)). (C) 1998 Academic Press.
引用
收藏
页码:399 / 401
页数:3
相关论文
共 50 条
  • [21] A communication and computation-efficient three-party authenticated key agreement protocol
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 854 - 863
  • [22] Three-party quantum communication complexity via entangled tripartite pure states
    Xue, P
    Li, CF
    Zhang, YS
    Guo, GC
    JOURNAL OF OPTICS B-QUANTUM AND SEMICLASSICAL OPTICS, 2001, 3 (04) : 219 - 222
  • [23] Measurement-device-independent three-party quantum secure direct communication
    Hong, Yi-Piao
    Zhou, Lan
    Zhong, Wei
    Sheng, Yu-Bo
    QUANTUM INFORMATION PROCESSING, 2023, 22 (02)
  • [24] Token-based authenticated key establishment protocols for three-party communication
    Yoon, Eun-Jun
    Yoo, Kee-Young
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 758 - +
  • [25] Three-Party ORAM for Secure Computation
    Faber, Sky
    Jarecki, Stanislaw
    Kentros, Sotirios
    Wei, Boyang
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 360 - 385
  • [26] Managing the three-party entanglement challenge
    Xie, Songbo
    Eberly, J. H.
    CONTEMPORARY PHYSICS, 2021, 62 (04) : 189 - 198
  • [27] Hierarchy of Three-Party Consistency Specifications
    Loss, Julian
    Maurer, Ueli
    Tschudi, Daniel
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 3048 - 3052
  • [28] Improvement of security of three-party quantum secure direct communication based on GHZ states
    Man Zhong-Xiao
    Xia Yun-Jie
    CHINESE PHYSICS LETTERS, 2007, 24 (01) : 15 - 18
  • [29] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96
  • [30] Communication Efficient Secure Three-Party Computation Using Lookup Tables for RNN Inference
    Wu, Yulin
    Liao, Chuyi
    Sun, Xiaozhen
    Shen, Yuyun
    Wu, Tong
    ELECTRONICS, 2025, 14 (05):