• DocumentCode
    3379895
  • Title

    Computationally private randomizing polynomials and their applications (extended abstract)

  • Author

    Applebaum, Benny ; Ishai, Yuval ; Kushilevitz, Eyal

  • Author_Institution
    Dept. of Comput. Sci., Technion, Haifa, Israel
  • fYear
    2005
  • fDate
    11-15 June 2005
  • Firstpage
    260
  • Lastpage
    274
  • Abstract
    Randomizing polynomials allow to represent a function f(x) by a low-degree randomized mapping fˆ(x, r) whose output distribution on an input x is a randomized encoding of f(x). It is known that any function f in ⊕L/poly (and in particular in NC1) can be efficiently represented by degree-3 randomizing polynomials. Such a degree-3 representation gives rise to an NC40 representation, in which every bit of the output depends on only 4 bits of the input. In this paper, we study the relaxed notion of computationally private randomizing polynomials, where the output distribution of fˆ(x, r) should only be computationally indistinguishable from a randomized encoding of f(x). We construct degree-3 randomizing polynomials of this type for every polynomial-time computable function, assuming the existence of a cryptographic pseudorandom generator (PRG) in ⊕L/poly. (The latter assumption is implied by most standard intractability assumptions used in cryptography.) This result is obtained by combining a variant of Yao\´s garbled circuit technique with previous "information-theoretic" constructions of randomizing polynomials.
  • Keywords
    computational complexity; cryptography; data privacy; functions; information theory; polynomials; random number generation; randomised algorithms; computationally private randomizing polynomials; cryptographic pseudorandom generator; function representation; garbled circuit technique; information theory; intractability assumptions; output distribution; polynomial-time computable function; randomized encoding; randomized mapping; Application software; Circuits; Computer science; Cryptography; Digital signatures; Distributed computing; Encoding; Polynomials; Public key; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Complexity, 2005. Proceedings. Twentieth Annual IEEE Conference on
  • ISSN
    1093-0159
  • Print_ISBN
    0-7695-2364-1
  • Type

    conf

  • DOI
    10.1109/CCC.2005.9
  • Filename
    1443091