Lower Bounds and Optimal Protocols for Three-Party Secure Computation

被引:0
|
作者
Rajan, Sundara S. [1 ]
Rajakrishnan, Shijin [1 ]
Thangaraj, Andrew [1 ]
Prabhakaran, Vinod [2 ]
机构
[1] ITT Madras, Dept Elect Engn, Madras 600036, Tamil Nadu, India
[2] TIFR Mumbai, Sch TCS, Bombay 400005, Maharashtra, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of three-party secure computation, where a function of private data of two parties is to be computed by a third party without revealing information beyond respective inputs or outputs is considered. New and better lower bounds on the amount of communication required between the parties to guarantee zero probability of error in the computation and achieve information-theoretic security are derived. Protocols are presented and proved to be optimal in some cases by showing that they achieve the improved lower bounds.
引用
收藏
页码:1361 / 1365
页数:5
相关论文
共 50 条
  • [1] Analysis of Two Secure Three-Party Computation Protocols for Triangle Area
    Liu, Lihua
    Cao, Jie
    [J]. International Journal of Network Security, 2021, 23 (04) : 734 - 737
  • [2] Three-Party ORAM for Secure Computation
    Faber, Sky
    Jarecki, Stanislaw
    Kentros, Sotirios
    Wei, Boyang
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 360 - 385
  • [3] Secure three-party computational protocols for triangle area
    Liang Liu
    Xiaofeng Chen
    Wenjing Lou
    [J]. International Journal of Information Security, 2016, 15 : 1 - 13
  • [4] Secure three-party computational protocols for triangle area
    Liu, Liang
    Chen, Xiaofeng
    Lou, Wenjing
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 1 - 13
  • [5] On the Exact Round Complexity of Secure Three-Party Computation
    Patra, Arpita
    Ravi, Divya
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [6] On the Exact Round Complexity of Secure Three-Party Computation
    Arpita Patra
    Divya Ravi
    [J]. Journal of Cryptology, 2021, 34
  • [7] On the Exact Round Complexity of Secure Three-Party Computation
    Patra, Arpita
    Ravi, Divya
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 425 - 458
  • [8] Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets
    Zhang, Lei
    He, Chongde
    Wei, Lifei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2286 - 2298
  • [9] Fast and Secure Three-party Computation: The Garbled Circuit Approach
    Mohassel, Payman
    Rosulek, Mike
    Zhang, Ye
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 591 - 602
  • [10] Information-Theoretically Secure Three-Party Computation with One Corrupted Party
    Wang, Ye
    Ishwar, Prakash
    Rane, Shantanu
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +