skip to main content
10.1145/73007acmconferencesBook PagePublication PagesstocConference Proceedingsconference-collections
STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing
ACM1989 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
STOC89: 21st Annual ACM Symposium on the Theory of Computing Seattle Washington USA May 14 - 17, 1989
ISBN:
978-0-89791-307-2
Published:
01 February 1989
Sponsors:
Next Conference
June 24 - 28, 2024
Vancouver , BC , Canada
Bibliometrics
Article
Free
Multiparty protocols and logspace-hard pseudorandom sequences

Let ƒ(x1, ···· xk) be a Boolean function that k parties wish to collaboratively evaluate. The i'th party knows each input argument except xi; and each party has unlimited computational power. They share a blackboard, viewed by all parties, where they ...

Article
Free
Pseudo-random generation from one-way functions

We show that the existence of one-way functions is necessary and sufficient for the existence of pseudo-random generators in the following sense. Let ƒ be an easily computable function such that when x is chosen randomly: (1) from ƒ(x) it is hard to ...

Article
Free
A hard-core predicate for all one-way functions

A central tool in constructing pseudorandom generators, secure encryption functions, and in other areas are “hard-core” predicates b of functions (permutations) ƒ, discovered in [Blum Micali 82]. Such b(x) cannot be efficiently guessed (substantially ...

Article
Free
Universal one-way hash functions and their cryptographic applications

We define a Universal One-Way Hash Function family, a new primitive which enables the compression of elements in the function domain. The main property of this primitive is that given an element x. We prove constructively that universal one-way hash ...

Article
Free
Limits on the provable consequences of one-way permutations

We present strong evidence that the implication, “if one-way permutations exist, then secure secret key agreement is possible”, is not provable by standard techniques. Since both sides of this implication are widely believed true in real life, to show ...

Article
Free
A zero-one law for Boolean privacy

A Boolean function ƒ: A1 X A2 X … X An → {0,1} is t - private if there exists a protocol for computing ƒ so that no coalition of size ≤ t can infer any additional information from the execution, other than the value of the function. We show that ƒ is ⌈n/...

Article
Free
Verifiable secret sharing and multiparty protocols with honest majority

Under the assumption that each participant can broadcast a message to all other participants and that each pair of participants can communicate secretly, we present a verifiable secret sharing protocol, and show that any multiparty protocol, or game ...

Article
Free
Designing programs that check their work

A program correctness checker is an algorithm for checking the output of a computation. This paper defines the concept of a program checker. It designs program checkers for a few specific and carefully chosen problems in the class P of problems solvable ...

Article
Free
Provably fast integer factoring with quasi-uniform small quadratic residues

Finding small quadratic residues modulo n, when n is a large composite number of unknown factorisation is almost certainly a computationally hard problem. This problem arises in a natural way when factoring n by the use of congruences of squares. We ...

Article
Free
Article
Free
Expressiveness of restricted recursive queries

We study the effect of various syntactic restrictions on the expressive power of database logic programs. We find natural examples of programs which

  • require recursively defined predicates of arbitrarily large width,

  • require rules with arbitrarily many ...

Article
Free
On Ω-automata and temporal logic

We study here the use of different representation for infinitary regular languages in extended temporal logic. We focus on three different kinds of acceptance conditions for finite automata on infinite words, due to Büchi, Streett, and Emerson and Lei (...

Article
Free
Quantifier elimination in the theory of an algebraically-closed field

In this paper we develop a fast parallel procedure for deciding when a set of multivariate polynomials with coefficients in an arbitrary field K have a common algebraic solution. Moreover, since the proposed algorithm is algebraic, it easily yields a ...

Article
Free
Probabilistic computation and linear time

In this paper, we give an oracle under which BPP is equal to probabilistic linear time, an unusual collapse of a complexity time hierarchy. In addition, we also give oracles where ΔP2 is contained in probabilistic linear time and where BPP has linear ...

Article
Free
The ismorphism conjecture fails relative to a random oracle

Berman and Hartmanis [BH77] conjectured that there is a polynomial-time computable isomorphism between any two languages m-complete (“Karp” complete) for NP. Joseph and Young [JY85] discovered a structurally defined class of NP-complete sets and ...

Article
Free
On the method of approximations
Article
Free
On the extended direct sum conjecture

We consider the quadratic complexity of certain sets of quadratic forms. We study a classes of direct sums of quadratic forms. For these classes of problems we show that the complexity of one direct sum is the sum of the complexity of the summands and ...

Article
Free
Circuits and local computation

This paper contains two parts. In Part I, we show that polynomial-size monotone threshold circuits of depth k form a proper hierarchy in parameter k. This implies in particular that monotone TC0 is properly contained in NC1. In Part II, we introduce a ...

Article
Free
A general sequential time-space tradeoff for finding unique elements

An optimal Ω(n2) lower bound is shown for the time-space product of any R-way branching program that determines those values which occur exactly once in a list of n integers in the range [1, R] where Rn. This Ω(n2) tradeoff also applies to the ...

Article
Free
On the theory of average case complexity

This paper takes the next step in developing the theory of average case complexity initiated by Leonid A. Levin. Previous works [Levin 84, Gurevich 87, Venkatesan and Levin 88] have focused on the existence of complete problems. We widen the scope to ...

    Article
    Free
    Tradeoffs between communication and space

    This paper initiates the study of communication complexity when the processors have limited work space. The following tradeoffs between number C of communications steps and space S are proved:

    • For multiplying two n × n matrices in the arithmetic model ...

    Article
    Free
    Work-preserving emulations of fixed-connection networks

    In this paper, we study the problem of emulating TG steps of an NG-node guest network on an NH-node host network. We call an emulation work-preserving if the time required by the host, TH, is Ο(TGNG/NH) because then both the guest and host networks ...

      Article
      Free
      An O(logN) deterministic packet routing scheme

      We present a deterministic Ο(log N) time algorithm for the problem of routing an arbitrary permutation on an N-processor bounded-degree network with bounded buffers.

      Unlike all previous deterministic solutions to this problem, our routing scheme does not ...

      Article
      Free
      Fast computation using faulty hypercubes

      We consider the computational power of a hypercube containing a potentially large number of randomly located faulty components. We describe a randomized algorithm which embeds an N-node hypercube in an N-node hypercube with faulty processors. Provided ...

      Article
      Free
      Optimal size integer division circuits

      Division is a fundamental problem for arithmetic and algebraic computation. This paper describes Boolean circuits (of bounded fan-in) for integer division (finding reciprocals) that have size Ο(M(n)) and depth Ο(lognlog logn), where M(n) is the size ...

      Article
      Free
      On the complexity of radio communication

      A radio network is a synchronous network of processors that communicate by transmitting messages to their neighbors. A processor receives a message in a given step if and only if it is silent then and precisely one of its neighbors transmits. This ...

      Article
      Free
      Local reorientation, global order, and planar topology

      Almost every problem on digraphs requires computing strongly connected components and directed spanning trees in one form or another. It has long been an open problem whether polylog time and linear processors are enough to find the strongly connected ...

      Article
      Free
      Parallel depth-first search in general directed graphs

      A directed cycle separator of an n-vertex directed graph is a simple directed cycle such that when the vertices of the cycle are deleted, the resulting graph has no strongly connected component with more than n/2 vertices. This paper shows that the ...

      Article
      Free
      Article
      Free
      Optimal separations between concurrent-write parallel machines

      We obtain tight bounds on the relative powers of the Priority and Common models of parallel random-access machines (PRAMs). Specifically we prove that:

      • The Element Distinctness function of n integers, though solvable in constant time on a Priority PRAM ...

      Contributors
      • AT&T Laboratories Florham Park

      Recommendations

      Acceptance Rates

      STOC '89 Paper Acceptance Rate56of196submissions,29%Overall Acceptance Rate1,469of4,586submissions,32%
      YearSubmittedAcceptedRate
      STOC '153479327%
      STOC '143199129%
      STOC '1336010028%
      STOC '113048428%
      STOC '083258025%
      STOC '032708030%
      STOC '022879132%
      STOC '012308336%
      STOC '001828547%
      STOC '981697544%
      STOC '972117536%
      STOC '962017437%
      STOC '891965629%
      STOC '881925328%
      STOC '871655030%
      STOC '801254738%
      STOC '791113733%
      STOC '781203832%
      STOC '77873136%
      STOC '76833036%
      STOC '75873136%
      STOC '74953537%
      STOC '71502346%
      STOC '70702739%
      Overall4,5861,46932%