On the Randomness Cost of Linear Secure Computation

被引:0
|
作者
Zhou, Yanliang [1 ]
Sun, Hua [1 ]
Fu, Shengli [1 ]
机构
[1] Univ North Texas, Dept Elect Engn, Denton, TX 76203 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure computation, where K users, each holding an independent message, wish to compute a function on the messages without revealing any additional information. We show that to compute M generic linear independent combinations of the messages securely (i.e., for the linear secure computation problem), it suffices to use min(inverted right perpendicularK - M - 1/2inverted left perpendicular, M) randomness symbols per message symbol (i.e., the randomness cost is no larger than min(inverted right perpendicularK - M - 1/2inverted left perpendicular, M)). The optimality of the achieved randomness cost remains open.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Updatable Encryption Secure Against Randomness Compromise
    Tanishita, Yuichi
    Hayashil, Ryuya
    Ishii, Ryu
    Matsuda, Takahiro
    Matsuura, Kanta
    CRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024, 2025, 14906 : 47 - 69
  • [32] Secure Communications with Limited Common Randomness at Transmitters
    Li, Fan
    Chen, Jinyuan
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1552 - 1557
  • [33] Addition of Fake Variable to Enrich Secure Linear Programming Computation Outsourcing in the Cloud
    Ahire, Pallavi
    Abraham, Jibi
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 477 - 482
  • [34] Research on the Secure Multi-party Computation of Some Linear Algebra Problems
    Zheng, Qiang
    Luo, Shoushan
    Xin, Yang
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 265 - 270
  • [35] Secure Network Function Computation for Linear Functions—Part I: Source Security
    Guang, Xuan
    Bai, Yang
    Yeung, Raymond W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (01) : 676 - 697
  • [36] Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
    Wang, Cong
    Ren, Kui
    Wang, Jia
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 216 - 229
  • [37] Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
    Ben-Sasson, Eli
    Fehr, Serge
    Ostrovsky, Rafail
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 663 - 680
  • [38] Secure and robust randomness with sequential quantum measurements
    Padovan, Matteo
    Foletto, Giulio
    Coccia, Lorenzo
    Avesani, Marco
    Villoresi, Paolo
    Vallone, Giuseppe
    NPJ QUANTUM INFORMATION, 2024, 10 (01)
  • [39] Secure Communications with Limited Common Randomness at Transmitters
    Louisiana Tech University, Department of Electrical Engineering, Ruston, United States
    IEEE Int Symp Inf Theor Proc, 2020, (1552-1557):
  • [40] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96