Two-Party Function Computation on the Reconciled Data

被引:0
|
作者
Kubjas, Ivo [1 ]
Skachek, Vitaly [1 ]
机构
[1] Univ Tartu, Inst Comp Sci, Tartu, Estonia
关键词
COMMUNICATION COMPLEXITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we initiate a study of a new problem termed function computation on the reconciled data, which generalizes a set reconciliation problem in the literature. Assume a distributed data storage system with two users A and B. The users possess a collection of binary vectors S-A and S-B, respectively. They are interested in computing a function phi of the reconciled data S-A U S-B. It is shown that any deterministic protocol, which computes a sum and a product of reconciled sets of binary vectors represented as nonnegative integers, has to communicate at least 2(n) + n - 1 and 2(n) + n - 2 bits in the worst-case scenario, respectively, where n is the length of the binary vectors. Connections to other problems in computer science, such as set disjointness and finding the intersection, are established, yielding a variety of additional upper and lower bounds on the communication complexity. A protocol for computation of a sum function, which is based on use of a family of hash functions, is presented, and its characteristics are analyzed.
引用
收藏
页码:390 / 396
页数:7
相关论文
共 50 条
  • [31] Secure Two-Party Computation: A Visual Way
    D'Arco, Paolo
    De Prisco, Roberto
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
  • [32] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [33] Application of Blind Quantum Computation to Two-Party Quantum Computation
    Sun, Zhiyuan
    Li, Qin
    Yu, Fang
    Chan, Wai Hong
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (06) : 1864 - 1871
  • [34] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [35] Universally-composable two-party computation in two rounds
    Horvitz, Omer
    Katz, Jonathan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 111 - 129
  • [36] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [37] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [38] Practical two-party computation based on the conditional gate
    Schoenmakers, B
    Tuyls, P
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 119 - 136
  • [39] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [40] Information theoretical analysis of two-party secret computation
    Wang, Da-Wei
    Liau, Churn-Jung
    Chiang, Yi-Ting
    Hsu, Tsan-Sheng
    DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 310 - 317