A Unified Characterization of Completeness and Triviality for Secure Function Evaluation
ثبت نشده
چکیده
We present unified combinatorial characterizations of completeness for 2-party secure function evaluation (SFE) against passive and active corruptions in the information-theoretic setting, so that all known characterizations appear as special cases. In doing so we develop new technical concepts. We define several notions of isomorphism of SFE functionalities and define the “kernel” of an SFE functionality. An SFE functionality is then said to be “simple” if and only if it is strongly isomorphic to its kernel. An SFE functionality F ′ is a core of an SFE functionality F if it is “redundancy free” and is weakly isomorphic to F . Then: ◦ An SFE functionality is complete for security against passive corruptions if and only if it is not simple. ◦ A deterministic SFE functionality is complete for security against active corruptions if and only if it has a core that is not simple. We conjecture that this characterization extends to randomized SFE as well. We further give explicit combinatorial characterizations of simple SFE functionalities. Finally, we apply our new notions of isomorphism to reduce the problem of characterization of trivial functionalities (i.e., those securely realizable without setups) for the case of general SFE to the same problem for the case of simple symmetric SFE.
منابع مشابه
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation
We present unified combinatorial characterizations of completeness for 2-party secure function evaluation (SFE) against passive and active corruptions in the information-theoretic setting, so that all known characterizations appear as special cases. In doing so we develop new technical concepts. We define several notions of isomorphism of SFE functionalities and define the “kernel” of an SFE fu...
متن کاملComplexity of Multi-Party Computation Functionalities
The central objects of secure multiparty computation are the “multiparty functions” (or functionalities) that it seeks to securely realize. In this chapter we survey a set of results that constitute a Cryptographic Complexity Theory. This theory classifies and compares multiparty functions according to their secure computability and reducibility to each other. The basic questions studied, under...
متن کاملFull Characterization of Completeness for Two-party Randomized Function Evaluation
We close a long line of work that has pursued a full characterization of completeness of (possibly randomized) finite functions for 2-party computation that is secure against active adversaries. The first such function was discovered almost quarter of a century back (Kilian, FOCS 1988). Since then the question of which all finite 2-party functions are complete has been studied extensively, lead...
متن کاملCharacterization of fuzzy complete normed space and fuzzy b-complete set
The present paper introduces the notion of the complete fuzzy norm on a linear space. And, some relations between the fuzzy completeness and ordinary completeness on a linear space is considered, moreover a new form of fuzzy compact spaces, namely b-compact spaces and b-closed spaces are introduced. Some characterizations of their properties are obtained.
متن کاملPower Function Distribution Characterized by Dual Generalized Order Statistics
The dual generalized order statistics is a unified model which contains the well known decreasingly ordered random data such as (reversed ordered) order statistics and lower record values. In the present paper, some characterization results on the power function distribution based on the properties of dual generalized order statistics are provided. The results are proved without any rest...
متن کامل