0 55 4 - 19 89

نویسنده

  • Eyal Kushilevitz
چکیده

Each of two parties P I and P 2 holds an n -bit input, x and y, respectively. They wish to privately compute the value off (x 'Y). That is, PI should not learn any additiorlal infonnation about y (in the infonnationtheoretic sense) other than what follows from its input x and the function value, f (x 'Y), and similarly, P 2 ~hou1d not learn any additional infonnation about x . In this paper we consider two ba~ic questions in the theqry of private computations: I) Which functions can be privately computed? .~) What is the communication complexity of protocols U\at privately compute a function f (in the case that such protocols eXi&b ? A complete combinatorial characterization df privately computable functions is given. We use this characteri~tion to derive tight bounds on the rounds complexity of aqr privately computable function, and to design optimal private protocols that compute these functions. We show that for every ISg(n)S2'2 there are functions that can be privately computed with g(n) -rounds of cpmmunication, but not with g (n}-I -rounds of communication. This implies that the communication costs of private protocols can be exponentially higher than the commpnication costs of non-private protocols. Iq~restingly, randomization does not help neither to increase th~ set of privately computable functions, nor to improve ,the rounds complexity of these functions. T ec hn io n C om pu te r Sc ie nc e D ep ar tm en t T eh ni ca l R ep or t C S0 55 4 19 89

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gestion Du Cycle De Vie De Services Deployes Sur Une Infrastructure De Calcul Distribuee Enneuroinformatique

v Abbreviations vii Thesis statement ix I Command–line interface applications as services 1 1 Services as building blocks of scienti c experiments 3 1.1 Interoperable applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Web services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3 Metacomputing and global computing . . . . . . . . . . . ....

متن کامل

Maternal Health Services in China’s Western Rural Areas: Uptake and Correlates Despite China’s rapid economic growth, maternal and infant health in rural areas

!"#$%&'()*"!#$%&!'()*+,!-.$*/-!0&0/.10!-$2.!0/3(44*.5!6+/-!/-.!5($*!7(.0/+8%0!89!:;!$%5!:?<!-86!/8! 3$+0.!+/"!@-.!8)A.,/+2.!89!/-+0!0/(5&!+0!/8!$00.00!/-.!('/$=.!3$/.!89!$!%.6!0./!89!1$/.3%$*!-.$*/-! 0.32+,.0!+%!'883!3(3$*!$3.$0!89!B-+%$"!@-.!$%$*&0+0!+0!)$0.5!8%!/-.!0(32.&!3.0'8%0.0!89!681.%C0! 3.'3.0.%/$/+2.0!...

متن کامل

NumAgents Average Distance Clustering Coefficient‐Watts‐Strogatz Component Count‐Strong Component Count‐Weak Congruence‐Communication Congruence‐Knowledge Congruence‐Resource Connectedness Diameter Diversity‐Knowledge Diversity‐Resource Edge Count‐Lateral Edge Count‐Pooled Edge Count‐Reciprocal Edge Count‐Sequential Edge Count‐Skip Efficiency Hierarchy Interdependence Load‐Knowledge Load‐Resource Negotiation‐Knowledge

value value value value value value value value value value value value value value value value value value value value value value value a2c2_team_d_no_scuds 6 1.0667 0.4167 4 1 ‐ ‐ 0.9188 1 6 ‐ 0.9833 8 0.9286 0.2857 0 0.8571 0.3 0.75 0.0867 ‐ 10 ‐ a2c2_team_d_scuds 6 1.1 0.925 1 1 ‐ ‐ 0.9189 1 2 ‐ 0.9859 18 1 0.8889 0 1 0 0 0.07 ‐ 11.8333 ‐ BFVG10 47 2.207 0.2268 35 16 ‐ ‐ ‐ 0.4588 47 ‐ ‐ 23...

متن کامل

Table DP-1. Profile of General Demographic Characteristics: 2000 Geographic area: Decatur town, Tennessee

Under 5 years . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 6.1 5 to 9 years . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 6.4 10 to 14 years . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 5.4 15 to 19 years . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 6.3 20 to 24 years . . . . . . . . . . . . . . . . . . . . . . ....

متن کامل

Corrections and Changes to the Third through the Seventh Printings

p. 55, line 7: read: if 0 < |en| < .9, p. 57, display (17): read: if 0 < |en| ≤ .2 • p. 58, Ex. 4.3/2: Omit. (too hard) p. 60, Ans. 4.3/2: read: 1024 p. 63, display (9): delete: > 0 p. 63, line 11 from bottom: read: 5.1/4 p. 68, line 10: replace: hypotheses by: symbols; replace or by and • p. 69, line 9: read: strictly increasing, clearly n1 ≥ 1, n2 ≥ 2, and so on, so eventually lines 11, 13: r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014