Secure multiparty computation of approximations - (Extended abstract)

被引:0
|
作者
Feigenbaum, J
Ishai, Y
Malkin, T
Nissim, K
Strauss, MJ
Wright, RN
机构
[1] Yale Univ, Dept Comp Sci, New Haven, CT 06520 USA
[2] DIMACS Ctr, Piscataway, NJ USA
[3] AT&T Labs Res, Florham Pk, NJ 07932 USA
[4] Weizmann Inst Sci, Dept Comp Sci & Appl Math, Rehovot, Israel
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and are extremely large, Furthermore, for some applications, the parties want to cooperate to compute a function of their inputs without revealing more information than necessary. If (f) over cap is an approximation to f, secure multiparty computation of (f) over cap allows the parties to compute (f) over cap without revealing unnecessary information. However, secure computation of (f) over cap may not be as private as secure computation of f, because the output of f may itself reveal more information than the output of f. In this paper, we present definitions of secure multiparty approximate computations that retain the privacy of a secure computation of f. We present an efficient, sublinear-communication, private approximate computation for the Hamming distance and an efficient private approximation of the permanent.
引用
收藏
页码:927 / 938
页数:12
相关论文
共 50 条
  • [21] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [22] Secure multiparty computation of a comparison problem
    Liu, Xin
    Li, Shundong
    Liu, Jian
    Chen, Xiubo
    Xu, Gang
    [J]. SPRINGERPLUS, 2016, 5
  • [23] Secure Multiparty Computation with Sublinear Preprocessing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    Nof, Ariel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 427 - 457
  • [24] Secure Multiparty Computation Goes Live
    Bogetoft, Peter
    Christensen, Dan Lund
    Damgard, Ivan
    Geisler, Martin
    Jakobsen, Thomas
    Kroigaard, Mikkel
    Nielsen, Janus Dam
    Nielsen, Jesper Buns
    Nielsen, Jurt
    Pagter, Jakob
    Schwartzbach, Michael
    Toft, Tomas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 325 - +
  • [25] General secure multiparty computation - Preface
    Goldreich, O
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 1 - 7
  • [26] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    [J]. ELECTRONICS, 2024, 13 (05)
  • [27] Practical applications of secure multiparty computation
    Talviste, Riivo
    [J]. Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [28] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [29] Secure multiparty computation in cloud computing
    Jiang, Han
    Xu, Qiuliang
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [30] Basic constructions of secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    Kamm, Liina
    Veeningen, Meilof
    [J]. Cryptology and Information Security Series, 2015, 13 : 1 - 25