• DocumentCode
    588306
  • Title

    The complexity of information theoretic secure computation

  • Author

    Ishai, Yuval

  • Author_Institution
    Technion - Israel Inst. of Technol., Haifa, Israel
  • fYear
    2012
  • fDate
    3-7 Sept. 2012
  • Firstpage
    80
  • Lastpage
    80
  • Abstract
    Summary form only given. A protocol for secure computation allows two or more parties to perform a distributed computation on their local inputs while hiding the inputs from each other. In the so-called “information theoretic” setting for secure computation, the parties are assumed to communicate over secure channels and the inputs should remain hidden even from computationally unbounded parties. It is known that every computation can done securely when there is a majority of honest parties, or alternatively when the parties are given access to certain types of correlated secret randomness. However, the true cost of such secure computations remains wide open. The talk will survey some recent progress and open questions in this area.
  • Keywords
    computational complexity; information theory; security of data; computationally unbounded parties; correlated secret randomness; distributed computation; information theoretic secure computation complexity; secure channels; secure computation protocol; Abstracts; Complexity theory; Conferences; Information theory; Protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2012 IEEE
  • Conference_Location
    Lausanne
  • Print_ISBN
    978-1-4673-0224-1
  • Electronic_ISBN
    978-1-4673-0222-7
  • Type

    conf

  • DOI
    10.1109/ITW.2012.6404768
  • Filename
    6404768