Secure Computation to Hide Functions of Inputs

05/11/2020
by   Gowtham R. Kurri, et al.
0

We consider a two-user secure computation problem in which Alice and Bob communicate interactively in order to compute some deterministic functions of the inputs. The privacy requirement is that each user should not learn any additional information about a function of the inputs other than what can be inferred from its own input and output. For the distribution-free setting, i.e., when the protocol must be correct and private for any joint input distribution, we completely characterize the set of all securely computable functions. When privacy is required only against Bob who computes a function based on a single transmission from Alice, we show that asymptotically secure computability is equivalent to perfectly secure computability. Separately, we consider an eavesdropper who has access to all the communication and should not learn any information about some function of the inputs (possibly different from the functions to be computed by the users) and show that interaction may be necessary for secure computation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/10/2018

Interactive Secure Function Computation

We consider interactive computation of randomized functions between two ...
research
01/02/2020

Expand-and-Randomize: An Algebraic Approach to Secure Computation

We consider the secure computation problem in a minimal model, where Ali...
research
09/28/2020

A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems

The problem of A privately transmitting information to B by a public ann...
research
09/21/2022

Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation

Secure multi-party computation have seen substantial performance improve...
research
06/11/2022

Network Function Computation With Different Secure Conditions

In this paper, we investigate function computation problems under differ...
research
01/03/2019

Scalable Information-Flow Analysis of Secure Three-Party Affine Computations

Elaborate protocols in Secure Multi-party Computation enable several par...
research
09/27/2018

Sharing Information with Competitors

We study the mechanism design problem in the setting where agents are re...

Please sign up or login with your details

Forgot password? Click here to reset