Secure Computation of Randomized Functions
Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2016-05 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Data, Deepesh |
description | Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own input and output. First we consider a scenario, where privacy conditions are against both the users. In perfect security setting Kilian [STOC 2000] gave a characterization of securely computable randomized functions, and we provide rate-optimal protocols for such functions. We prove that the same characterization holds in asymptotic security setting as well and give a rate-optimal protocol. In another scenario, where privacy condition is only against the user who is not computing the function, we provide rate-optimal protocols. For perfect security in both the scenarios, our results are in terms of chromatic entropies of different graphs. In asymptotic security setting, we get single-letter expressions of rates in both the scenarios. |
doi_str_mv | 10.48550/arxiv.1601.06562 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_1601_06562</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2080737282</sourcerecordid><originalsourceid>FETCH-LOGICAL-a522-7c5ae49b639963fa683beb4c3ee52061ddb24f93a9a4ca8bb07f214b022d6e573</originalsourceid><addsrcrecordid>eNotj0tLw0AUhQdBsNT-AFcG3AmJd-48s5RgrVAQtPtwJ5lAisnESSLqr7cPVwcOH4fzMXbDIZNWKXig-N1-ZVwDz0ArjRdsgULw1ErEK7Yaxz0AoDaolFiw-3dfzdEnReiGeaKpDX0SmuSN-jp07a-vk_XcV8d6vGaXDX2MfvWfS7ZbP-2KTbp9fX4pHrcpKcTUVIq8zJ0Wea5FQ9oK552shPcKQfO6diibXFBOsiLrHJgGuXSAWGuvjFiy2_PsSaQcYttR_CmPQuVJ6EDcnYkhhs_Zj1O5D3PsD59KBAtGGLQo_gDalkz1</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2080737282</pqid></control><display><type>article</type><title>Secure Computation of Randomized Functions</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Data, Deepesh</creator><creatorcontrib>Data, Deepesh</creatorcontrib><description>Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own input and output. First we consider a scenario, where privacy conditions are against both the users. In perfect security setting Kilian [STOC 2000] gave a characterization of securely computable randomized functions, and we provide rate-optimal protocols for such functions. We prove that the same characterization holds in asymptotic security setting as well and give a rate-optimal protocol. In another scenario, where privacy condition is only against the user who is not computing the function, we provide rate-optimal protocols. For perfect security in both the scenarios, our results are in terms of chromatic entropies of different graphs. In asymptotic security setting, we get single-letter expressions of rates in both the scenarios.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.1601.06562</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Asymptotic properties ; Computation ; Computer Science - Cryptography and Security ; Computer Science - Information Theory ; Cybersecurity ; Mathematics - Information Theory ; Privacy ; Randomization</subject><ispartof>arXiv.org, 2016-05</ispartof><rights>2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,780,881,27902</link.rule.ids><backlink>$$Uhttps://doi.org/10.1109/ISIT.2016.7541860$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.1601.06562$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Data, Deepesh</creatorcontrib><title>Secure Computation of Randomized Functions</title><title>arXiv.org</title><description>Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own input and output. First we consider a scenario, where privacy conditions are against both the users. In perfect security setting Kilian [STOC 2000] gave a characterization of securely computable randomized functions, and we provide rate-optimal protocols for such functions. We prove that the same characterization holds in asymptotic security setting as well and give a rate-optimal protocol. In another scenario, where privacy condition is only against the user who is not computing the function, we provide rate-optimal protocols. For perfect security in both the scenarios, our results are in terms of chromatic entropies of different graphs. In asymptotic security setting, we get single-letter expressions of rates in both the scenarios.</description><subject>Asymptotic properties</subject><subject>Computation</subject><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Information Theory</subject><subject>Cybersecurity</subject><subject>Mathematics - Information Theory</subject><subject>Privacy</subject><subject>Randomization</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>GOX</sourceid><recordid>eNotj0tLw0AUhQdBsNT-AFcG3AmJd-48s5RgrVAQtPtwJ5lAisnESSLqr7cPVwcOH4fzMXbDIZNWKXig-N1-ZVwDz0ArjRdsgULw1ErEK7Yaxz0AoDaolFiw-3dfzdEnReiGeaKpDX0SmuSN-jp07a-vk_XcV8d6vGaXDX2MfvWfS7ZbP-2KTbp9fX4pHrcpKcTUVIq8zJ0Wea5FQ9oK552shPcKQfO6diibXFBOsiLrHJgGuXSAWGuvjFiy2_PsSaQcYttR_CmPQuVJ6EDcnYkhhs_Zj1O5D3PsD59KBAtGGLQo_gDalkz1</recordid><startdate>20160510</startdate><enddate>20160510</enddate><creator>Data, Deepesh</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>AKZ</scope><scope>GOX</scope></search><sort><creationdate>20160510</creationdate><title>Secure Computation of Randomized Functions</title><author>Data, Deepesh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a522-7c5ae49b639963fa683beb4c3ee52061ddb24f93a9a4ca8bb07f214b022d6e573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Asymptotic properties</topic><topic>Computation</topic><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Information Theory</topic><topic>Cybersecurity</topic><topic>Mathematics - Information Theory</topic><topic>Privacy</topic><topic>Randomization</topic><toplevel>online_resources</toplevel><creatorcontrib>Data, Deepesh</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv Mathematics</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Data, Deepesh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Computation of Randomized Functions</atitle><jtitle>arXiv.org</jtitle><date>2016-05-10</date><risdate>2016</risdate><eissn>2331-8422</eissn><abstract>Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own input and output. First we consider a scenario, where privacy conditions are against both the users. In perfect security setting Kilian [STOC 2000] gave a characterization of securely computable randomized functions, and we provide rate-optimal protocols for such functions. We prove that the same characterization holds in asymptotic security setting as well and give a rate-optimal protocol. In another scenario, where privacy condition is only against the user who is not computing the function, we provide rate-optimal protocols. For perfect security in both the scenarios, our results are in terms of chromatic entropies of different graphs. In asymptotic security setting, we get single-letter expressions of rates in both the scenarios.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.1601.06562</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2016-05 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_1601_06562 |
source | arXiv.org; Free E- Journals |
subjects | Asymptotic properties Computation Computer Science - Cryptography and Security Computer Science - Information Theory Cybersecurity Mathematics - Information Theory Privacy Randomization |
title | Secure Computation of Randomized Functions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T09%3A41%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Computation%20of%20Randomized%20Functions&rft.jtitle=arXiv.org&rft.au=Data,%20Deepesh&rft.date=2016-05-10&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.1601.06562&rft_dat=%3Cproquest_arxiv%3E2080737282%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2080737282&rft_id=info:pmid/&rfr_iscdi=true |