2019
DOI: 10.48550/arxiv.1908.01204
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Private Sequential Function Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…In this work, we take a Shannon theoretic perspective at the canonical conditional disclosure of secrets problem to seek capacity characterizations where the secret size is allowed to approach infinity while most cryptography work focuses on the scaling of communication cost with the input size 7 [1,[5][6][7][8][9]. This Shannon theoretic perspective follows the footsteps of recent attempts in the information theory community on other cryptographic primitives [14][15][16][17][18][19][20][21][22][23]. Towards this end, we further develop the noise and signal alignment approach, which is a variation of interference alignment originally studied in wireless communication networks [24][25][26] and is introduced in [4], to characterize the linear capacity of a class of CDS instances, which go beyond the highest capacity scenarios found in [4].…”
Section: Discussionmentioning
confidence: 99%
“…In this work, we take a Shannon theoretic perspective at the canonical conditional disclosure of secrets problem to seek capacity characterizations where the secret size is allowed to approach infinity while most cryptography work focuses on the scaling of communication cost with the input size 7 [1,[5][6][7][8][9]. This Shannon theoretic perspective follows the footsteps of recent attempts in the information theory community on other cryptographic primitives [14][15][16][17][18][19][20][21][22][23]. Towards this end, we further develop the noise and signal alignment approach, which is a variation of interference alignment originally studied in wireless communication networks [24][25][26] and is introduced in [4], to characterize the linear capacity of a class of CDS instances, which go beyond the highest capacity scenarios found in [4].…”
Section: Discussionmentioning
confidence: 99%
“…The problem in Fig. 2 is related to private information retrieval (PIR), introduced in [29] and widely studied in recent years, e.g., [30]- [39]. In the PIR problem, the master server wishes to retrieve a message within some library from a set of distributed databases, each of which stores all the messages.…”
Section: B Related Workmentioning
confidence: 99%
“…, P , respectively. Since each undesired matrix is evaluated at an identical random point for all workers the second term in (39), i.e., r∈[1,L]\κ F B (r) (z r ), can be considered as a constant term.…”
Section: A Secure and Private Generalized Polydot Codesmentioning
confidence: 99%
“…It is thus imperative to understand the fundamental limits of perfect security in multi-user networks, which has been studied in the cryptography and theoretical computer science communities [4], although typically not using information theoretic tools. Due to the increasing importance of security in modern communication systems, it has also recently become one of the focuses for the information theory community [5][6][7], where both classical cryptography formulations are studied [8][9][10][11][12][13] and new models are introduced [14][15][16][17][18]. The goal of this paper is to use information theoretic tools to study a canonical theoretical computer science problem (i.e., a cryptographic primitive) -conditional disclosure of secrets (CDS) [19][20][21].…”
Section: Introductionmentioning
confidence: 99%