THRESHOLD COMPUTATION AND CRYPTOGRAPHIC SECURITY

Citation
Yn. Han et al., THRESHOLD COMPUTATION AND CRYPTOGRAPHIC SECURITY, SIAM journal on computing, 26(1), 1997, pp. 59-78
Citations number
38
Categorie Soggetti
Computer Sciences","Computer Science Theory & Methods",Mathematics
Journal title
ISSN journal
00975397
Volume
26
Issue
1
Year of publication
1997
Pages
59 - 78
Database
ISI
SICI code
0097-5397(1997)26:1<59:TCACS>2.0.ZU;2-N
Abstract
Threshold machines are Turing machines whose acceptance is determined by what portion of the machine's computation paths are accepting paths . Probabilistic machines are Turing machines whose acceptance is deter mined by the probability weight of the machine's accepting computation paths. In 1975, Simon proved that for unbounded-error polynomial-time machines these two notions yield the same class, PP. Perhaps because Simon's result seemed to collapse the threshold and probabilistic mode s of computation, the relationship between threshold and probabilistic computing for the case of bounded error has remained unexplored. In t his paper, we compare the bounded-error probabilistic class BPP with t he analogous threshold class, BPPpath, and, more generally, we study t he structural properties of BPPpath. We prove that BPPpath contains bo th NPBPP and P-NP[log] and that BPPpath is contained in P-Sigma 2p[log ], BPPNP, and PP. We conclude that, unless the polynomial hierarchy co llapses, bounded-error threshold computation is strictly more powerful than bounded-error probabilistic computation. We also consider the na tural notion of secure access to a database: an adversary who watches the queries should gain no information about the input other than perh aps its length. We show for both BPP and BPPpath that if there is a ny database for which this formalization of security differs from the se curity given by oblivious database access, then P not equal PSPACE. It follows that if any set lacking small circuits can be securely accept ed, then P not equal PSPACE.