DocumentCode :
3663484
Title :
On coding for secure computing
Author :
Deepesh Data;Vinod M. Prabhakaran
Author_Institution :
School of Technology &
fYear :
2015
fDate :
6/1/2015 12:00:00 AM
Firstpage :
2737
Lastpage :
2741
Abstract :
In information theoretically secure multiparty computation, several mutually distrusting users want to jointly compute a function of their private data such that users do not learn any additional information about other users´ data other than what they can infer from their own data and the function value they compute. In this work we consider asymptotically secure computation - where vanishing probability of error and vanishing information leakage are allowed as block lengths become large - in a three user setting, where two users have inputs and third user securely computes the output of a function on these two inputs. We provide generic lower bounds on the amount of communication required among users and the total amount of private randomness needed to compute any function in this three-user model. We also consider some examples where our bounds are tight. Our lower bounds are derived for the honest-but-curious security model and hence also apply for the malicious model.
Keywords :
"Protocols","Privacy","Computational modeling","Entropy","Zinc","Security","Data processing"
Publisher :
ieee
Conference_Titel :
Information Theory (ISIT), 2015 IEEE International Symposium on
Electronic_ISBN :
2157-8117
Type :
conf
DOI :
10.1109/ISIT.2015.7282954
Filename :
7282954
Link To Document :
بازگشت