scispace - formally typeset
Open AccessProceedings ArticleDOI

Secure computation of randomized functions

TLDR
In this article, the authors considered two user secure computation of randomized functions, where only one user computes the output and both the users are semi-honest, and the computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own inputs and output.
Abstract
Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own input and output. First we consider a scenario, where privacy conditions are against both the users. In perfect security setting, Kilian gave a characterization of securely computable randomized functions in [1], and we provide rate-optimal protocols for such functions. We prove that the same characterization holds in asymptotic security setting as well and give a rate-optimal protocol. In another scenario, where privacy condition is only against the user who is not computing the function, we provide rate-optimal protocols. For perfect security in both the scenarios, our results are in terms of chromatic entropies of different graphs. In asymptotic security setting, we get single-letter expressions of rates in both the scenarios.

read more

Citations
More filters
Book ChapterDOI

Towards Characterizing Securely Computable Two-Party Randomized Functions

TL;DR: In this paper, the authors make progress towards understanding securely computable randomized functions by using tools developed in the study of completeness to bear on the problem of combinatorially characterizing all randomized functions with information-theoretic semi-honest secure 2-party computation protocols.
Proceedings ArticleDOI

The Role of Interaction and Common Randomness in Two-User Secure Computation

TL;DR: This work considers interactive computation of randomized functions between two users with the following privacy requirement: the interactive communication should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input andoutput.
Posted Content

Truly Perfect Samplers for Data Streams and Sliding Windows.

TL;DR: In this article, the authors studied the complexity of constructing a truly perfect sampling algorithm in the data stream and sliding window models, and showed that the problem can be reduced to the problem of finding a sampling algorithm with a distribution that is close to the true distribution.
Proceedings ArticleDOI

Secure computation of randomized functions: Further results

TL;DR: In this article, the authors considered secure computation of randomized functions by two users, where both the users (Alice and Bob) have inputs, Alice sends a message to Bob over a rate-limited, noise-free link, and then Bob produces the output.
Posted Content

Secure Computation of Randomized Functions: Further Results

TL;DR: This work studies secure computation of randomized functions by two users, where both the users have inputs, Alice sends a message to Bob over a rate-limited, noise-free link, and then Bob produces the output, and gives a single-letter expression for the optimal rate.
References
More filters
Journal ArticleDOI

Noiseless coding of correlated information sources

TL;DR: The minimum number of bits per character R_X and R_Y needed to encode these sequences so that they can be faithfully reproduced under a variety of assumptions regarding the encoders and decoders is determined.
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Proceedings ArticleDOI

How to generate and exchange secrets

TL;DR: A new tool for controlling the knowledge transfer process in cryptographic protocol design is introduced and it is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature.
Proceedings ArticleDOI

Protocols for secure computations

Yao
TL;DR: The author gives a precise formulation of this general problem and describes three ways of solving it by use of one-way functions, which have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc.
Related Papers (5)