On the number of random bits in totally private computation

被引:0
|
作者
Blundo, C
DeSantis, A
Persiano, G
Vaccaro, U
机构
[1] INT COMP SCI INST,BERKELEY,CA 94704
[2] DIMACS CTR,NEW BRUNSWICK,NJ
[3] UNIV BIELEFELD,DEPT MATH,W-4800 BIELEFELD,GERMANY
[4] TECHNION ISRAEL INST TECHNOL,DEPT COMP SCI,IL-32000 HAIFA,ISRAEL
来源
AUTOMATA, LANGUAGES AND PROGRAMMING | 1995年 / 944卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the classic problem of n honest but curious players with private inputs x(1),...,x(n), who wish to compute the value of a fixed function f(x(1),...,x(n)) in such way that at the end of the protocol every player knows the value f(x(1),...,x(n)). Each pair of players is connected by a secure point-to-point communication channel. The players have unbounded computational resources and they intend to compute f in a totally private way. That is, after the execution of the protocol no coalition of arbitrary size can get any information about the inputs of the remaining players other than what can be deduced by their own inputs and the value of f. We study the amount of randomness needed in totally private protocols. Our main result is a lower bound on the number of random bits needed to compute a function with sensitivity pz. As a corollary we obtain that when the private inputs are uniformly distributed and the players have access to a source of uniformly distributed bits, at least k(n - 1)(n - 2)/2 random bits are needed to compute the sum module 2(k) of n k-bit integers. This result is tight as there are protocols for this problem that use exactly this number of random bits.
引用
收藏
页码:171 / 182
页数:12
相关论文
共 50 条