Private Computations Over the Integers (Extended Abstract)

نویسندگان

  • Benny Chor
  • Mihály Geréb-Graus
  • Eyal Kushilevitz
چکیده

The subject of this work is the possibility of private distributed computations of nargument functions defined over the integers. A function f is t private if there exists a protocol for computing f , so that no coalition of 5 t participants can infer any additional information from the execution of the protocol. It is known that over finite domains, every function can be computed prieven n private. We prove that this result cannot be extended to infinite domains. The possibility of privately computing f is shown to be closely related to the communication complexity of f . Using this relation, we show, for example, that n argument addition is 191 private over the non-negative integers, but not even 1 private over all the integers. Finally, a complete characterization of tvately. Some functions, like a 1 ’ dition, are *e-mail: [email protected] . Department of Computer Science, Technion, Haifa 32000, Israel. Research supported in part by US-Israel BSF grant 88-00282. Part of this research was done while visiting the Computer Science Department in the University of Toronto. +e-mail: [email protected] . Department of Computer Science, Tufts University, Medford, MA 02155. Se-mail: [email protected] . Department of Computer Science, Technion, Haifa 32000, Israel. Research supported in part by US-Israel BSF grant 88-00282. private Boolean functions over countable domains is given. A Boolean function is l private if and only if its communication complexity is bounded. This characterization enables us to prove that every Boolean function falls into one of the following three categories: It is either n private, 191 private but not private, or not 1 private.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

Fixed-Point Computations over Functions on Integers with Operations min, max and plus

Various kinds of graph problems, including shortest path computation, proof-number search, dataflow analysis, etc., can be solved by fixed-point computations over functions defined on natural numbers or integers. In this paper, we prove that fixed-point computations are possible for the algebra Z∞ = Z∪{∞,−∞}, which has the operators min, max and plus. Since Z∞ is not well-ordered, we formulate ...

متن کامل

Automatically Exploring the Domain of Residue Classes Extended Abstract

We describe a module for exploring simple algebraic properties of operations on residue class sets over the integers. The framework is implemented within the mega theorem proving environment [1]. It employs computations of the computer algebra system Gap [3] to classify a given residue class set together with one or two operations in terms of its algebraic structure. During this classi cation p...

متن کامل

EXTENDED PREDICTOR-CORRECTOR METHODS FOR SOLVING FUZZY DIFFERENTIAL EQUATIONS UNDER GENERALIZED DIFFERENTIABILITY

In this paper, the (m+1)-step Adams-Bashforth, Adams-Moulton, and Predictor-Correctormethods are used to solve rst-order linear fuzzy ordinary dierential equations. The conceptsof fuzzy interpolation and generalised strongly dierentiability are used, to obtaingeneral algorithms. Each of these algorithms has advantages over current methods. Moreover,for each algorithm a convergence formula can b...

متن کامل

A Comparative Study of RSA based Cryptographic Algorithms

In 1978 a powerful and practical public-key scheme Hadi Otrokwas produced by RSA; there work was applied using 2 large random odd primes p and q, each roughly of the same size. El-Kassar and Awad modi...ed the RSA public-key encryption scheme from the domain of natural integers, Z , to two principal ideal domains, namely the domain of Gaussian integers, Z [i], and the domain of the rings of pol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990