DocumentCode :
3069907
Title :
Secure computing
Author :
Tyagi, Himanshu ; Narayan, Prakash ; Gupta, Piyush
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
fYear :
2010
fDate :
13-18 June 2010
Firstpage :
2612
Lastpage :
2616
Abstract :
We study a problem of secure computation by multiple parties of a given function of their cumulative observations, using public communication but without revealing the value of the function to an eavesdropper with access to this communication. A Shannon theoretic formulation is introduced to characterize necessary and sufficient conditions for secure computability. Drawing on innate connections of this formulation to the problem of secret key generation by the same parties using public communication, we show that a function is securely computable if and only if its entropy is smaller than the secret key capacity. Conditions for secure computability at a lone terminal are also derived by association with an appropriate secret key generation problem.
Keywords :
cryptography; entropy; Shannon theoretic formulation; entropy; public communication; secret key generation; secure computing; Channel capacity; Computer networks; Cryptography; Educational institutions; Entropy; History; Protocols; Sensor phenomena and characterization; Sufficient conditions; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4244-7890-3
Electronic_ISBN :
978-1-4244-7891-0
Type :
conf
DOI :
10.1109/ISIT.2010.5513720
Filename :
5513720
Link To Document :
بازگشت