On the number of random bits in totally private computation

被引:0
|
作者
Blundo, C
DeSantis, A
Persiano, G
Vaccaro, U
机构
[1] INT COMP SCI INST,BERKELEY,CA 94704
[2] DIMACS CTR,NEW BRUNSWICK,NJ
[3] UNIV BIELEFELD,DEPT MATH,W-4800 BIELEFELD,GERMANY
[4] TECHNION ISRAEL INST TECHNOL,DEPT COMP SCI,IL-32000 HAIFA,ISRAEL
来源
AUTOMATA, LANGUAGES AND PROGRAMMING | 1995年 / 944卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the classic problem of n honest but curious players with private inputs x(1),...,x(n), who wish to compute the value of a fixed function f(x(1),...,x(n)) in such way that at the end of the protocol every player knows the value f(x(1),...,x(n)). Each pair of players is connected by a secure point-to-point communication channel. The players have unbounded computational resources and they intend to compute f in a totally private way. That is, after the execution of the protocol no coalition of arbitrary size can get any information about the inputs of the remaining players other than what can be deduced by their own inputs and the value of f. We study the amount of randomness needed in totally private protocols. Our main result is a lower bound on the number of random bits needed to compute a function with sensitivity pz. As a corollary we obtain that when the private inputs are uniformly distributed and the players have access to a source of uniformly distributed bits, at least k(n - 1)(n - 2)/2 random bits are needed to compute the sum module 2(k) of n k-bit integers. This result is tight as there are protocols for this problem that use exactly this number of random bits.
引用
收藏
页码:171 / 182
页数:12
相关论文
共 50 条
  • [41] Counting Bits for Distributed Function Computation
    Ayaso, Ola
    Shah, Devavrat
    Dahleh, Munther A.
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 652 - 656
  • [42] HOW TO RECYCLE RANDOM BITS
    IMPAGLIAZZO, R
    ZUCKERMAN, D
    30TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 1989, : 248 - 253
  • [43] How to share random bits
    Zimand, M
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 10TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 1997, : 23 - 26
  • [44] Pseudo-random bits
    Hickman, I
    ELECTRONICS WORLD, 2001, 107 (1783): : 500 - 503
  • [45] A private collector of horses' bits "chalinologue"
    Desclos, Pierre-Marie
    IN SITU-REVUE DE PATRIMOINES, 2015, (27):
  • [46] The entropy of a distributed computation random number generation from memory interleaving
    Antoniadis, Karolos
    Blanchard, Peva
    Guerraoui, Rachid
    Stainer, Julien
    DISTRIBUTED COMPUTING, 2018, 31 (05) : 389 - 417
  • [47] Secure Computation by Secret Sharing using Input Encrypted with Random Number
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 540 - 547
  • [48] Entropy Computation for Oscillator-based Physical Random Number Generators
    Lubicz, David
    Fischer, Viktor
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [49] Entropy Computation for Oscillator-based Physical Random Number Generators
    David Lubicz
    Viktor Fischer
    Journal of Cryptology, 2024, 37
  • [50] Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
    Smith, Adam
    PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2007, : 395 - 404