2002
DOI: 10.1007/3-540-45708-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Private Computation — k-Connected versus 1-Connected Networks

Abstract: We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by private protocols even if the underlying network is 1-connected but not 2-connected. Then we give a complete characterisation of non-degenerate functions that can be computed on non-2-connected networks. Furthermore, a general technique for simulating private protocols on arbitrary networks will be presented. Using this technique every… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
18
0

Year Published

2003
2003
2013
2013

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 27 publications
1
18
0
Order By: Relevance
“…We give an exact characterization of the functions that can be computed privately in such a network. This result generalizes the result of Bläser et al [4] characterizing the Boolean functions that can be privately computed in such a network with 2 two-connected components. While Boolean functions that can be privately computed in such networks have a very simple structure ("if then else" functions), the non-Boolean functions that can be privately computed in such networks have a richer structure.…”
Section: Our Resultssupporting
confidence: 86%
See 1 more Smart Citation
“…We give an exact characterization of the functions that can be computed privately in such a network. This result generalizes the result of Bläser et al [4] characterizing the Boolean functions that can be privately computed in such a network with 2 two-connected components. While Boolean functions that can be privately computed in such networks have a very simple structure ("if then else" functions), the non-Boolean functions that can be privately computed in such networks have a richer structure.…”
Section: Our Resultssupporting
confidence: 86%
“…Bläser et al [4] characterize the Boolean functions that can be privately computed in simple non twoconnected networks, that is, in connected networks with one separating vertex and 2 two-connected components. We consider the more general question that naturally arises.…”
Section: Theorem 11 If N > 3 and The Network G Is Two-connected Thementioning
confidence: 99%
“…From [3,1] we can conclude that most auction protocols cannot be run privately on non-2-connected networks. Therefore, we demand a communication network to be at least 2-connected.…”
Section: Privacy and Securitymentioning
confidence: 98%
“…Franklin and Yung [13] investigated the role of the connectivity of the underlying network in private computations. Bläser et al [3] completely characterized the class of privately computable Boolean functions, if the underlying network is connected but not 2-connected. In particular, no non-degenerate function can be computed privately if the network consists of three or more blocks.…”
Section: Related Work Concerning Private Computationmentioning
confidence: 99%
“…In this section, we consider the more general case where, typically, the number of parties is significantly smaller than the circuit size. The randomness complexity of general t-private computations was studied by Canetti et al [18] (other works, such as [38,37,36,24,14], concentrated on special values of t or on special tasks).…”
Section: Secure Multiparty Computationmentioning
confidence: 99%