Secure multiparty computation of approximations - (Extended abstract)

被引:0
|
作者
Feigenbaum, J
Ishai, Y
Malkin, T
Nissim, K
Strauss, MJ
Wright, RN
机构
[1] Yale Univ, Dept Comp Sci, New Haven, CT 06520 USA
[2] DIMACS Ctr, Piscataway, NJ USA
[3] AT&T Labs Res, Florham Pk, NJ 07932 USA
[4] Weizmann Inst Sci, Dept Comp Sci & Appl Math, Rehovot, Israel
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and are extremely large, Furthermore, for some applications, the parties want to cooperate to compute a function of their inputs without revealing more information than necessary. If (f) over cap is an approximation to f, secure multiparty computation of (f) over cap allows the parties to compute (f) over cap without revealing unnecessary information. However, secure computation of (f) over cap may not be as private as secure computation of f, because the output of f may itself reveal more information than the output of f. In this paper, we present definitions of secure multiparty approximate computations that retain the privacy of a secure computation of f. We present an efficient, sublinear-communication, private approximate computation for the Hamming distance and an efficient private approximation of the permanent.
引用
收藏
页码:927 / 938
页数:12
相关论文
共 50 条
  • [41] Global-Scale Secure Multiparty Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 39 - 56
  • [42] Key technologies and applications of secure multiparty computation
    [J]. Guo, X. (guoxiaoqiang@heuu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [43] On Adaptively Secure Multiparty Computation with a Short CRS
    Cohen, Ran
    Peikert, Chris
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 129 - 146
  • [44] Application-Scale Secure Multiparty Computation
    Launchbury, John
    Archer, Dave
    DuBuisson, Thomas
    Mertens, Eric
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2014, 8410 : 8 - 26
  • [45] Secure Multiparty Quantum Computation for Summation and Multiplication
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    [J]. Scientific Reports, 6
  • [46] A Scripting Language for Automating Secure Multiparty Computation
    Chen, Kung
    Hsu, Tsan-sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 127 - 134
  • [47] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [48] Bit Decomposition Protocols in Secure Multiparty Computation
    Laud, Peeter
    Pankova, Alisa
    [J]. WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 37 - 48
  • [49] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [50] Proactive Secure Multiparty Computation with a Dishonest Majority
    Eldefrawy, Karim
    Ostrovsky, Rafail
    Park, Sunoo
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 200 - 215