2020
DOI: 10.1109/tit.2020.2980789
|View full text |Cite
|
Sign up to set email alerts
|

Interactive Secure Function Computation

Abstract: We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we give single-letter expressions for feasibility and optimal rates of communication. Then we discuss the role of com… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 58 publications
0
4
0
Order By: Relevance
“…We say that a tuple (p XY , f 1 (x, y), f 2 (x, y), g(x, y)) is perfectly securely computable in r rounds if there exists a protocol Π n with n = 1 such that (17)-( 18) are satisfied with = 0. It is worthwhile to remark here that, in this setting, asymptotically secure computability is not equivalent to perfectly secure computability as pointed out in our earlier work [12,Remark 2].…”
Section: Privacy Against An Eavesdroppermentioning
confidence: 88%
See 3 more Smart Citations
“…We say that a tuple (p XY , f 1 (x, y), f 2 (x, y), g(x, y)) is perfectly securely computable in r rounds if there exists a protocol Π n with n = 1 such that (17)-( 18) are satisfied with = 0. It is worthwhile to remark here that, in this setting, asymptotically secure computability is not equivalent to perfectly secure computability as pointed out in our earlier work [12,Remark 2].…”
Section: Privacy Against An Eavesdroppermentioning
confidence: 88%
“…Instead of functions of inputs, suppose if the inputs and outputs of users need to be hidden, our earlier work [12,Theorem 1] shows that asymptotically secure computability is equivalent to perfectly secure computability even with interactive communication. However, this is not true for all secure computation problems.…”
Section: B Non-interactive Setting With Input Distributionmentioning
confidence: 99%
See 2 more Smart Citations