Circuits and multi-party protocols

被引:0
|
作者
V. Grolmusz
机构
[1] Department of Computer Science,
[2] Eötvös University,undefined
[3] Múzem krt. 6-8,undefined
[4] H-1088 Budapest,undefined
[5] Hungary,undefined
[6] e-mail: grolmusz@cs.elte.hu,undefined
来源
关键词
Key words. Lower bounds; threshold circuits; ACC-circuits; communication protocols.;
D O I
暂无
中图分类号
学科分类号
摘要
Using multi-party communication techniques, we prove that depth-3 circuits with a threshold gate at the top, arbitrary symmetric gates at the next level, and fan-in k MODm gates at the bottom need exponential size to compute the k-wise inner product function of Babai, Nisan and Szegedy, where m is an odd positive integer satisfying \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $ m \equiv k \bmod 2m $\end{document}. This is one of the rare lower-bound results involving MODm gates with non-prime power moduli.¶Exponential gap theorems are also presented between the multi-party communication complexities of closely related functions.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 50 条
  • [1] Circuits and multi-party protocols
    Grolmusz, V
    [J]. COMPUTATIONAL COMPLEXITY, 1998, 7 (01) : 1 - 18
  • [2] Optimizing multi-party agreement protocols
    Fedotov, Ivan
    Khritankov, Anton
    Barger, Artem
    [J]. 2022 4TH CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2022, : 55 - 58
  • [3] Quantum protocols for secure multi-party summation
    Ji, ZhaoXu
    Zhang, HuanGuo
    Wang, HouZhen
    Wu, FuSheng
    Jia, JianWei
    Wu, WanQing
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (06)
  • [4] Adaptive Security of Multi-party Protocols, Revisited
    Hirt, Martin
    Liu-Zhang, Chen-Da
    Maurer, Ueli
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 686 - 716
  • [5] Multi-Party Protocols, Information Complexity and Privacy
    Kerenidis, Iordanis
    Rosen, Adi
    Urrutia, Florent
    [J]. ACM TRANSACTIONS ON COMPUTATION THEORY, 2019, 11 (02)
  • [6] On the Efficiency of Multi-party Contract Signing Protocols
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep-Lluis
    Francisca Hinarejos, M.
    Zhou, Jianying
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 227 - 243
  • [7] Quantum protocols for secure multi-party summation
    ZhaoXu Ji
    HuanGuo Zhang
    HouZhen Wang
    FuSheng Wu
    JianWei Jia
    WanQing Wu
    [J]. Quantum Information Processing, 2019, 18
  • [8] Batch Logical Protocols for Efficient Multi-Party Computation
    Kiribuchi, Naoto
    Kato, Ryo
    Endo, Tsukasa
    Nishide, Takashi
    Yoshiura, Hiroshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (10) : 1718 - 1728
  • [9] SafeRegions: Performance evaluation of multi-party protocols on HBase
    Pontes, Rogerio
    Maia, Francisco
    Paulo, Joao
    Vilaca, Ricardo
    [J]. 2016 IEEE 35TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS WORKSHOPS (SRDSW), 2016, : 31 - 36
  • [10] Improvement of Quantum Protocols for Secure Multi-Party Summation
    Gan Zhi-Gang
    [J]. International Journal of Theoretical Physics, 2020, 59 : 3086 - 3092