Two-Party Function Computation on the Reconciled Data

被引:0
|
作者
Kubjas, Ivo [1 ]
Skachek, Vitaly [1 ]
机构
[1] Univ Tartu, Inst Comp Sci, Tartu, Estonia
关键词
COMMUNICATION COMPLEXITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we initiate a study of a new problem termed function computation on the reconciled data, which generalizes a set reconciliation problem in the literature. Assume a distributed data storage system with two users A and B. The users possess a collection of binary vectors S-A and S-B, respectively. They are interested in computing a function phi of the reconciled data S-A U S-B. It is shown that any deterministic protocol, which computes a sum and a product of reconciled sets of binary vectors represented as nonnegative integers, has to communicate at least 2(n) + n - 1 and 2(n) + n - 2 bits in the worst-case scenario, respectively, where n is the length of the binary vectors. Connections to other problems in computer science, such as set disjointness and finding the intersection, are established, yielding a variety of additional upper and lower bounds on the communication complexity. A protocol for computation of a sum function, which is based on use of a family of hash functions, is presented, and its characteristics are analyzed.
引用
收藏
页码:390 / 396
页数:7
相关论文
共 50 条
  • [41] Secure Two-Party Computation over Unreliable Channels
    Gelles, Ran
    Paskin-Cherniavsky, Anat
    Zikas, Vassilis
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
  • [42] A study of secure two-party circle computation problem
    Liu, Wen
    Luo, Shou-Shan
    Yang, Yi-Xian
    Xin, Yang
    Xiao, Qian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35
  • [43] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552
  • [44] Rational Secure Two-party Computation in Social Cloud
    Wang, Yilei
    Liu, Zhe
    Li, Tao
    Xu, Qiuliang
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
  • [45] Completeness in Two-Party Secure Computation: A Computational View
    Danny Harnik
    Moni Naor
    Omer Reingold
    Alon Rosen
    Journal of Cryptology, 2006, 19 : 521 - 552
  • [46] Efficiently Making Secure Two-Party Computation Fair
    Kilinc, Handan
    Kupcu, Alptekin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
  • [47] Outsourcing secure two-party computation as a black box
    Carter, Henry
    Mood, Benjamin
    Traynor, Patrick
    Butler, Kevin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2261 - 2275
  • [48] Round-optimal secure two-party computation
    Katz, J
    Ostrovsky, R
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
  • [49] Privacy Preserving Two-Party Rational Set Computation
    Dou J.-W.
    Liu X.-H.
    Wang W.-L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1397 - 1413
  • [50] Outsourcing Secure Two-Party Computation as a Black Box
    Carter, Henry
    Mood, Benjamin
    Traynor, Patrick
    Butler, Kevin
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 214 - 222