Threshold computation and cryptographic security

7Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Threshold machines [21] are Turing machines whose acceptance is determined by what portion of the machine’s computation paths are accepting paths. Probabilistic machines [11] are Turing machines whose acceptance is determined by the probability weight of the machine’s accepting computation paths. Simon [21] proved that for unbounded-error polynomial-time machines these two notions yield the same class, PP. Perhaps because Simon’s result seemed to collapse the threshold and probabilistic modes of computation, the relationship between threshold and probabilistic computing for the case of bounded error has remained unexplored. In this paper, we compare the bounded-error probabilistic class BPP with the analogous threshold class, BPPpath, and, more generally, we study the structural properties of BPPpath. We prove that BPPpath contains both NPBPP and PNP[log], and that BPPpath is contained in (formula presented), BPPNP, and PP. We conclude that, unless the polynomial hierarchy collapses, bounded-error threshold computation is strictly more powerful than bounded-error probabilistic computation. We also consider the natural notion of secure access to a database: an adversary who watches the queries should gain no information about the input other than perhaps its length [5]. We show, for both BPP and BPPpath, that if there is any database for which this formalization of security differs from the security given by oblivious [9] database access, then BPP≠PP. It follows that if any set lacking small circuits can be securely accepted, then BPP≠PP.

Cite

CITATION STYLE

APA

Hart, Y., Hemaspaandra, L. A., & Thierauf, T. (1993). Threshold computation and cryptographic security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 762 LNCS, pp. 230–239). Springer Verlag. https://doi.org/10.1007/3-540-57568-5_253

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free