• DocumentCode
    3069907
  • Title

    Secure computing

  • Author

    Tyagi, Himanshu ; Narayan, Prakash ; Gupta, Piyush

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
  • fYear
    2010
  • fDate
    13-18 June 2010
  • Firstpage
    2612
  • Lastpage
    2616
  • Abstract
    We study a problem of secure computation by multiple parties of a given function of their cumulative observations, using public communication but without revealing the value of the function to an eavesdropper with access to this communication. A Shannon theoretic formulation is introduced to characterize necessary and sufficient conditions for secure computability. Drawing on innate connections of this formulation to the problem of secret key generation by the same parties using public communication, we show that a function is securely computable if and only if its entropy is smaller than the secret key capacity. Conditions for secure computability at a lone terminal are also derived by association with an appropriate secret key generation problem.
  • Keywords
    cryptography; entropy; Shannon theoretic formulation; entropy; public communication; secret key generation; secure computing; Channel capacity; Computer networks; Cryptography; Educational institutions; Entropy; History; Protocols; Sensor phenomena and characterization; Sufficient conditions; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on
  • Conference_Location
    Austin, TX
  • Print_ISBN
    978-1-4244-7890-3
  • Electronic_ISBN
    978-1-4244-7891-0
  • Type

    conf

  • DOI
    10.1109/ISIT.2010.5513720
  • Filename
    5513720