Communication Complexity and Secure Function Evaluation

نویسندگان

  • Moni Naor
  • Kobbi Nissim
چکیده

A secure function evaluation protocol allows two parties to jointly compute a function f(x; y) of their inputs in a manner not leaking more information than necessary. A major result in this eld is: \any function f that can be computed using polynomial resources can be computed securely using polynomial resources" (where `resources' refers to communication and computation). This result follows by a general transformation from any circuit for f to a secure protocol that evaluates f . Although the resources used by protocols resulting from this transformation are polynomial in the circuit size, they are much higher (in general) than those required for an insecure computation of f . For the design of e cient secure protocols we suggest two new methodologies, that di er with respect to their underlying computational models. In one methodology we utilize the communication complexity tree (or branching program) representation of f . We start with an e cient (insecure) protocol for f and transform it into a secure protocol. In other words, \any function f that can be computed using communication complexity c can be can be computed securely using communication complexity that is polynomial in c and a security parameter". The second methodology uses the circuit computing f , enhanced with look-up tables as its underlying computational model. It is possible to simulate any RAM machine in this model with polylogarithmic blowup. Hence it is possible to start with a computation of f on a RAM machine and transform it into a secure protocol. We show many applications of these new methodologies resulting in protocols e cient either in communication or in computation. In particular, we exemplify a protocol for the \millionaires problem", where two participants want to compare their values but reveal no other information. Our protocol is more e cient than previously known ones in either communication or computation. A preliminary version of this paper appeared under the title Communication Preserving Protocols for Secure Function Evaluation in Proceedings of the 33rd ACM Symposium on Theory of Computing, 2001. y Work done while the author was visiting Stanford University and the IBM Almaden research center.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation

Motivated by questions about secure multi-party computation, we introduce and study a new natural representation of functions by polynomials, which we term randomizing polynomials. “Standard” low-degree polynomials over a finite field are easy to compute witha small number of communication rounds in virtually any setting for secure computation. However, most Boolean functions cannot be evaluate...

متن کامل

Secure Two - party Computation and Communication by

Secure Two-party Computation and Communication Vladimir Kolesnikov Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2006 In this dissertation, we address several issues that arise in protecting communication between parties, as well as in the area of secure function evaluation. Intuitively, the notion of secure function evaluation is clear and natural: several ...

متن کامل

Secure Two-party Computation and Communication

Secure Two-party Computation and Communication Vladimir Kolesnikov Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2006 We address several issues that arise in protecting parties’ communication, and in the area of secure function evaluation. Intuitively, the notion of secure function evaluation is natural: several parties wish to compute some function of their...

متن کامل

Vladimir Kolesnikov A thesis submitted in conformity

Secure Two-party Computation and Communication Vladimir Kolesnikov Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2006 We address several issues that arise in protecting parties’ communication, and in the area of secure function evaluation. Intuitively, the notion of secure function evaluation is natural: several parties wish to compute some function of their...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2001  شماره 

صفحات  -

تاریخ انتشار 2001