Noncryptographic Selection Protocols ( Extended

نویسنده

  • Uriel Feige
چکیده

Selection tasks generalize some well studied problems, such as collective coin flipping and leader election. We present new selection protocols in the full information model, and new negative results. In particular, when there are (1 + δ)n/2 good players, we show a protocol that chooses a good leader with probability Ω(δ), and show that every leader election protocol has success probability O(δ1− ), for every > 0. Previously known protocols for this problem have success probability that is exponentially small in 1/δ, and no nontrivial upper bounds on the success probability were known.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

First CPIR Protocol with Data-Dependent Computation

We design a new (n, 1)-CPIR protocol BddCpir for `-bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communication-efficient (2, 1)-CPIR). BddCpir is the first CPIR protocol where server’s online computation depends substantially on the concrete database. We then show that (a) for reasonably small values of `, BddCpir is guar...

متن کامل

Ensemble Classification and Extended Feature Selection for Credit Card Fraud Detection

Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...

متن کامل

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

OMNeT++ based Opportunistic Routing Protocols Simulation: A Framework

This paper describes a framework for simulating opportunistic routing protocols in the INETMANET framework of OMNeT++. The proposed modules adopt an abstraction of the generic functions of the most representative opportunistic routing algorithms. The main contribution is an OMNeT++ modeling architecture that could be extended to implement different opportunistic routing schemes. Our work provid...

متن کامل

Extended MULTIMOORA method based on Shannon entropy weight for materials selection

Selection of appropriate material is a crucial step in engineering design and manufacturing process. Without a systematic technique, many useful engineering materials may be ignored for selection. The category of multiple attribute decision-making (MADM) methods is an effective set of structured techniques. Having uncomplicated assumptions and mathematics, the MULTIMOORA method as an MADM appro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999