Secure multiparty computation of approximations - (Extended abstract)

被引:0
|
作者
Feigenbaum, J
Ishai, Y
Malkin, T
Nissim, K
Strauss, MJ
Wright, RN
机构
[1] Yale Univ, Dept Comp Sci, New Haven, CT 06520 USA
[2] DIMACS Ctr, Piscataway, NJ USA
[3] AT&T Labs Res, Florham Pk, NJ 07932 USA
[4] Weizmann Inst Sci, Dept Comp Sci & Appl Math, Rehovot, Israel
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and are extremely large, Furthermore, for some applications, the parties want to cooperate to compute a function of their inputs without revealing more information than necessary. If (f) over cap is an approximation to f, secure multiparty computation of (f) over cap allows the parties to compute (f) over cap without revealing unnecessary information. However, secure computation of (f) over cap may not be as private as secure computation of f, because the output of f may itself reveal more information than the output of f. In this paper, we present definitions of secure multiparty approximate computations that retain the privacy of a secure computation of f. We present an efficient, sublinear-communication, private approximate computation for the Hamming distance and an efficient private approximation of the permanent.
引用
收藏
页码:927 / 938
页数:12
相关论文
共 50 条
  • [1] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [2] One-Round Secure Multiparty Computation of Arithmetic Streams and Functions (Extended Abstract)
    Bitan, Dor
    Dolev, Shlomi
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018, 2018, 10879 : 255 - 273
  • [3] Secure multiparty computations using the 15 puzzle (Extended abstract)
    Mizuki, Takaaki
    Kugimoto, Yoshinori
    Sone, Hideaki
    [J]. COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2007, 4616 : 255 - +
  • [4] Secure Multiparty Computation
    Lindell, Yehuda
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [5] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    [J]. International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [6] Secure multiparty computation of DNF
    Peng, Kun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [7] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [8] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [9] Efficient secure multi-party computation - (Extended abstract)
    Hirt, M
    Maurer, U
    Przydatek, B
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161
  • [10] Fair secure two-party computation - Extended abstract
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 87 - 105