Lower Bounds and Optimal Protocols for Three-Party Secure Computation

被引:0
|
作者
Rajan, Sundara S. [1 ]
Rajakrishnan, Shijin [1 ]
Thangaraj, Andrew [1 ]
Prabhakaran, Vinod [2 ]
机构
[1] ITT Madras, Dept Elect Engn, Madras 600036, Tamil Nadu, India
[2] TIFR Mumbai, Sch TCS, Bombay 400005, Maharashtra, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of three-party secure computation, where a function of private data of two parties is to be computed by a third party without revealing information beyond respective inputs or outputs is considered. New and better lower bounds on the amount of communication required between the parties to guarantee zero probability of error in the computation and achieve information-theoretic security are derived. Protocols are presented and proved to be optimal in some cases by showing that they achieve the improved lower bounds.
引用
收藏
页码:1361 / 1365
页数:5
相关论文
共 50 条
  • [41] On the Power of an Honest Majority in Three-Party Computation Without Broadcast
    Alon, Bar
    Cohen, Ran
    Omri, Eran
    Suad, Tom
    [J]. JOURNAL OF CRYPTOLOGY, 2023, 36 (03)
  • [42] Three Party Secure Computation with Friends and Foes
    Alon, Bar
    Beimel, Amos
    Omri, Eran
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 156 - 185
  • [43] Three-party authenticated key agreements for optimal communicatione
    Lee, Tian-Fu
    Hwang, Tzonelih
    [J]. PLOS ONE, 2017, 12 (03):
  • [44] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Tian-Fu Lee
    Ching-Ying Lin
    Chun-Li Lin
    Tzonelih Hwang
    [J]. Nonlinear Dynamics, 2015, 82 : 29 - 38
  • [45] Three-Party Quantum Network Communication Protocols Based on Quantum Teleportation
    Nan-Run Zhou
    Hu-Lai Cheng
    Li-Hua Gong
    Chi-Sheng Li
    [J]. International Journal of Theoretical Physics, 2014, 53 : 1387 - 1403
  • [46] Communication-efficient three-party protocols for authentication and key agreement
    Lee, Tian-Fu
    Liu, Jenn-Long
    Sung, Mei-Jiun
    Yang, Shiueng-Bien
    Chen, Chia-Mei
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 58 (04) : 641 - 648
  • [47] Three-party quantum secure direct communication based on GHZ states
    Jin, Xing-Ri
    Ji, Xin
    Zhang, Ying-Qiao
    Zhang, Shou
    Hong, Suc-Kyoung
    Yeon, Kyu-Hwang
    Um, Chung-In
    [J]. PHYSICS LETTERS A, 2006, 354 (1-2) : 67 - 70
  • [48] Scalable Information Flow Analysis of Secure Three-Party Affine Computations
    Ah-Fat, Patrick
    Huth, Michael
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2967 - 2971
  • [49] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Lee, Tian-Fu
    Lin, Ching-Ying
    Lin, Chun-Li
    Hwang, Tzonelih
    [J]. NONLINEAR DYNAMICS, 2015, 82 (1-2) : 29 - 38
  • [50] Three-party quantum secure direct communication against collective noise
    He, Ye-Feng
    Ma, Wen-Ping
    [J]. QUANTUM INFORMATION PROCESSING, 2017, 16 (10)