DocumentCode
3069907
Title
Secure computing
Author
Tyagi, Himanshu ; Narayan, Prakash ; Gupta, Piyush
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
fYear
2010
fDate
13-18 June 2010
Firstpage
2612
Lastpage
2616
Abstract
We study a problem of secure computation by multiple parties of a given function of their cumulative observations, using public communication but without revealing the value of the function to an eavesdropper with access to this communication. A Shannon theoretic formulation is introduced to characterize necessary and sufficient conditions for secure computability. Drawing on innate connections of this formulation to the problem of secret key generation by the same parties using public communication, we show that a function is securely computable if and only if its entropy is smaller than the secret key capacity. Conditions for secure computability at a lone terminal are also derived by association with an appropriate secret key generation problem.
Keywords
cryptography; entropy; Shannon theoretic formulation; entropy; public communication; secret key generation; secure computing; Channel capacity; Computer networks; Cryptography; Educational institutions; Entropy; History; Protocols; Sensor phenomena and characterization; Sufficient conditions; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on
Conference_Location
Austin, TX
Print_ISBN
978-1-4244-7890-3
Electronic_ISBN
978-1-4244-7891-0
Type
conf
DOI
10.1109/ISIT.2010.5513720
Filename
5513720
Link To Document