On the number of random bits in totally private computation

被引:0
|
作者
Blundo, C
DeSantis, A
Persiano, G
Vaccaro, U
机构
[1] INT COMP SCI INST,BERKELEY,CA 94704
[2] DIMACS CTR,NEW BRUNSWICK,NJ
[3] UNIV BIELEFELD,DEPT MATH,W-4800 BIELEFELD,GERMANY
[4] TECHNION ISRAEL INST TECHNOL,DEPT COMP SCI,IL-32000 HAIFA,ISRAEL
来源
AUTOMATA, LANGUAGES AND PROGRAMMING | 1995年 / 944卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the classic problem of n honest but curious players with private inputs x(1),...,x(n), who wish to compute the value of a fixed function f(x(1),...,x(n)) in such way that at the end of the protocol every player knows the value f(x(1),...,x(n)). Each pair of players is connected by a secure point-to-point communication channel. The players have unbounded computational resources and they intend to compute f in a totally private way. That is, after the execution of the protocol no coalition of arbitrary size can get any information about the inputs of the remaining players other than what can be deduced by their own inputs and the value of f. We study the amount of randomness needed in totally private protocols. Our main result is a lower bound on the number of random bits needed to compute a function with sensitivity pz. As a corollary we obtain that when the private inputs are uniformly distributed and the players have access to a source of uniformly distributed bits, at least k(n - 1)(n - 2)/2 random bits are needed to compute the sum module 2(k) of n k-bit integers. This result is tight as there are protocols for this problem that use exactly this number of random bits.
引用
收藏
页码:171 / 182
页数:12
相关论文
共 50 条
  • [1] Random Sources in Private Computation
    Couteau, Geoffroy
    Rosen, Adi
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 443 - 473
  • [2] PRIVATE VS COMMON RANDOM BITS IN COMMUNICATION COMPLEXITY
    NEWMAN, I
    INFORMATION PROCESSING LETTERS, 1991, 39 (02) : 67 - 71
  • [3] Reconstructing RSA Private Keys from Random Key Bits
    Heninger, Nadia
    Shacham, Hovav
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 1 - +
  • [4] RANDOM-NUMBER COMPUTATION - REPLY
    WHITNEY, CA
    BYTE, 1985, 10 (03): : 429 - 429
  • [5] Close to Uniform Prime Number Generation With Fewer Random Bits
    Fouque, Pierre-Alain
    Tibouchi, Mehdi
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (02) : 1307 - 1317
  • [6] Close to Uniform Prime Number Generation with Fewer Random Bits
    Fouque, Pierre-Alain
    Tibouchi, Mehdi
    AUTOMATA, LANGUAGES, AND PROGRAMMING (ICALP 2014), PT I, 2014, 8572 : 991 - 1002
  • [7] Lower Bounds for the Number of Random Bits in Monte Carlo Algorithms
    Heinrich, Stefan
    MONTE CARLO AND QUASI-MONTE CARLO METHODS, MCQMC 2020, 2022, 387 : 131 - 147
  • [8] RANDOMNESS OF LOW-ORDER BITS IN RANDOM NUMBER GENERATORS
    DEARMON, JS
    SIMULATION, 1994, 62 (06) : 373 - 377
  • [9] The m-least significant bits operation for quantum random number generation
    Chen, Ziyang
    Li, Zhengyu
    Xu, Bingjie
    Zhang, Yichen
    Guo, Hong
    JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2019, 52 (19)
  • [10] Unpredictable 16 bits LFSR-based True Random Number Generator
    Han, Mangi
    Kim, Youngmin
    PROCEEDINGS INTERNATIONAL SOC DESIGN CONFERENCE 2017 (ISOCC 2017), 2017, : 284 - 285