Better Computing on the Anonymous Ring
نویسندگان
چکیده
We consider a bidirectional ring of n processors, where processors are anonymous, i.e., are indistinguishable. In this model it is known that “most” functions (in particular XOR and orientation) have worst case message complexity @(n’) for asynchronous computations, and O(n log n) for synchronous computations. The average case behavior is different; an algorithm that computes XOR asynchronously with O(nA) messages on the average is known. In this paper we give tight bounds on the average complexity of various problems. We show the following:
منابع مشابه
A New Anonymous Authentication Method Based on One-way Accumulator
Due to applications of trusted computing become more and more widespread, that how to protect client’s privacy is imminent. However, existing solutions can hardly meet practical requirement. Therefore, this dissertation puts forward an improved authentication which realizes Direct Anonymous Attestation with ring signature based on one-way accumulator, and constructs its solution in detail. In t...
متن کاملAnonymous Post-Quantum Cryptocash
In this paper, we construct an anonymous and decentralized cryptocash system which is secure in the quantum computation model. In order to achieve that, a linkable ring signature based on the ideal lattice is proposed. The size of a signature in our scheme is O(logN), where N is the cardinality of the ring. The framework of our cryptocash system follows that of CryptoNote with some modification...
متن کاملAnonymous Post-Quantum Cryptocash (Full Version)
In this paper, we construct an anonymous and decentralized cryptocash system which is potentially secure against quantum computers. In order to achieve that, a linkable ring signature based on ideal lattices is proposed. The size of a signature in our scheme is O(logN), where N is the cardinality of the ring. The framework of our cryptocash system follows that of CryptoNote with some modificati...
متن کاملبررسی تأثیرات رایانش ابری بر یادگیری الکترونیکی
In the world of training, online training is introduced as a modern model of training services. Cloud computing is a modern technology which is provided software, infrastructure and platform as internet. Also, online training is introduced as a modern model of training services on the web. In this research, the impact of cloud computing on e-learning on the case of Mehralborz online university ...
متن کاملComparing the effects of combined cognitive behavioral therapy and methadone therapy with the association of narcotics anonymous addicts on executive functions of quitting drugs volunteer addicts in Jiroft
Introduction: Currently, a combination of drug and psychological therapies is common to treat and prevent relapse in addicts. One of the most important strategies for recovery and prevention of relapse is psychological therapy and maintenance therapy applying drugs such as methadone. Therefore, the present study compares the effect of cognitive-behavioral and methadone therapy combination thera...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1988