Network Extractor Protocols

    FOCS, pp. 654-663, 2008.

    Cited by: 24|Bibtex|Views5|Links
    EI
    Keywords:
    asynchronous settingcomputational settingnetwork extractornetwork extractor protocolsparties onlyhave accessMore(17+)

    Abstract:

    We design efficient protocols for processors to extract private randomness overa network with Byzantine faults, when each processor has access to anindependent weakly-random $n$-bit source of sufficient min-entropy.We give several such \emph{network extractor protocols} in both the information theoretic and computational settings.For a co...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments