Book ChapterDOI
Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation
Sibi Raj B Pillai,Manoj Prabhakaran,Vinod M. Prabhakaran,Srivatsan Sridhar +3 more
- pp 216-226
Reads0
Chats0
TLDR
This note shows that in fact, this message is also optimal in the protocol of Feige et al. (ISIT 2016), which improves on a previous result of Rajan et al., which showed this optimality restricted to protocols where Alice and Bob are deterministic.Abstract:
In an influential work aimed at understanding the communication requirements of secure computation, Feige, Kilian and Naor introduced a minimal model of secure computation (STOC 1994). In that work, among other results, Feige et al. presented a simple protocol for the 2 input AND function. It has remained an intriguing question whether the communication and randomness used in this protocol are optimal. While previous work of Data et al. (CRYPTO 2014) showed that the communication from the two parties with inputs (Alice and Bob) to the third party who gets the output is optimal, the question of optimality for the third message in the protocol – a common reference string shared between Alice and Bob – remained open. In this note we show that in fact, this message (and hence all the randomness used in the protocol) is also optimal in the protocol of Feige et al. This improves on a previous result of Rajan et al. (ISIT 2016), which showed this optimality restricted to protocols where Alice and Bob are deterministic. Further, our result holds even if only a weak secrecy condition is required of the protocol.read more
Citations
More filters
The Communication Complexity of Private Simultaneous Messages, Revisited.
TL;DR: FKN identified a set of simple requirements, showed that any function that satisfies these requirements is subject to the \(3k-O(1)\) lower-bound, and proved that a random function is likely to satisfy the requirements.
References
More filters
Book
Secure Multiparty Computation and Secret Sharing
TL;DR: This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing, focusing on asymptotic results with interesting applications related to MPC.
Proceedings ArticleDOI
A minimal model for secure computation (extended abstract)
Uri Feige,Joe Killian,Moni Naor +2 more
TL;DR: A Minimal Model for Secure Computation as discussed by the authors is a secure model for secure computation in the context of secure computing. But it is not secure computing for all applications, however.
Proceedings ArticleDOI
Communication complexity of secure computation (extended abstract)
Matthew K. Franklin,Moti Yung +1 more
TL;DR: This paper begins the investigation of the communication complexity of unconditionally secure multi-party computation, and its relation with various fault-tolerance models, and presents upper and lower bounds on communication, as well as tradeoffs among resources.
Proceedings ArticleDOI
Privacy and communication complexity
TL;DR: A complete combinatorial characterization of privately computable functions is given and this characterization is used to derive tight bounds on the rounds complexity of any privately Computable function and to design optimal private protocols that compute these functions.