DocumentCode :
588306
Title :
The complexity of information theoretic secure computation
Author :
Ishai, Yuval
Author_Institution :
Technion - Israel Inst. of Technol., Haifa, Israel
fYear :
2012
fDate :
3-7 Sept. 2012
Firstpage :
80
Lastpage :
80
Abstract :
Summary form only given. A protocol for secure computation allows two or more parties to perform a distributed computation on their local inputs while hiding the inputs from each other. In the so-called “information theoretic” setting for secure computation, the parties are assumed to communicate over secure channels and the inputs should remain hidden even from computationally unbounded parties. It is known that every computation can done securely when there is a majority of honest parties, or alternatively when the parties are given access to certain types of correlated secret randomness. However, the true cost of such secure computations remains wide open. The talk will survey some recent progress and open questions in this area.
Keywords :
computational complexity; information theory; security of data; computationally unbounded parties; correlated secret randomness; distributed computation; information theoretic secure computation complexity; secure channels; secure computation protocol; Abstracts; Complexity theory; Conferences; Information theory; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location :
Lausanne
Print_ISBN :
978-1-4673-0224-1
Electronic_ISBN :
978-1-4673-0222-7
Type :
conf
DOI :
10.1109/ITW.2012.6404768
Filename :
6404768
Link To Document :
بازگشت