2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2014
DOI: 10.1109/allerton.2014.7028604
|View full text |Cite
|
Sign up to set email alerts
|

Two shannon-type problems on secure multi-party computations

Abstract: Abstract-In secure multi-party computations (SMC), parties wish to compute a function on their private data without revealing more information about their data than what the function reveals. In this paper, we investigate two Shannon-type questions on this problem. We first consider the traditional one-shot model for SMC which does not assume a probabilistic prior on the data. In this model, private communication and randomness are the key enablers to secure computing, and we investigate a notion of randomness… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(24 citation statements)
references
References 17 publications
(20 reference statements)
2
21
0
Order By: Relevance
“…In the encryption stage, suppose the random numbers are 10 and 7, then the resulting of Equation 1 is 68 × 33 + 10 = 2254 and 78 × 33 + 7 = 2581. After encryption, the plain data x becomes encrypt(x) = { [12,8,26], [15,21,1], [8,19,22]}, and the plain data y becomes encrypt(y) = { [16,26,20], [14,0,9], [6,13,8]}, the client sends encrypt(x) and encrypt(y) to the server.…”
Section: Algorithm 4 Decryptionmentioning
confidence: 99%
“…In the encryption stage, suppose the random numbers are 10 and 7, then the resulting of Equation 1 is 68 × 33 + 10 = 2254 and 78 × 33 + 7 = 2581. After encryption, the plain data x becomes encrypt(x) = { [12,8,26], [15,21,1], [8,19,22]}, and the plain data y becomes encrypt(y) = { [16,26,20], [14,0,9], [6,13,8]}, the client sends encrypt(x) and encrypt(y) to the server.…”
Section: Algorithm 4 Decryptionmentioning
confidence: 99%
“…Within the standard secure multi-party computation model of [9], Lee and Abbe determine in [10] the least amount of randomness needed for securely computing a given function. This provides a novel notion of the complexity of a function for its secure computation.…”
Section: A Related Workmentioning
confidence: 99%
“…In [11], Data et al take a distributed source coding approach to the problem of securely computing the modulo-2 sum of two distributed binary sources. Similarly to [10], they assume the data to be drawn from some joint memoryless source and derive bounds on the amount of randomness and communication needed to asymptotically achieve secrecy. In [12], the results are extended to arbitrary functions.…”
Section: A Related Workmentioning
confidence: 99%
“…Specifically, we will assume a probability distribution for the data (discrete memoryless distributed source), and seek the averagecase performance under asymptotically vanishing error and vanishing privacy leakage. We would like to point out that [15] already considered a similar setting, but for a much weaker notion of security than what we consider below. For concreteness and simplicity, we focus on the famous example of Körner and Marton [12].…”
Section: Introductionmentioning
confidence: 99%
“…As already pointed out above, another related work is [15]. It studies the randomness required for secure sum computation under two different settings: (i) in the zero-error, perfect privacy, worst-case setting, and (ii) average case, asymptotically correct setting under a much weaker notion of privacy that users are unable to asymptotically correctly guess the entire data of another user, but when no private randomness is available to the users.…”
Section: Introductionmentioning
confidence: 99%