Title :
The complexity of information theoretic secure computation
Author_Institution :
Technion - Israel Inst. of Technol., Haifa, Israel
Abstract :
Summary form only given. A protocol for secure computation allows two or more parties to perform a distributed computation on their local inputs while hiding the inputs from each other. In the so-called “information theoretic” setting for secure computation, the parties are assumed to communicate over secure channels and the inputs should remain hidden even from computationally unbounded parties. It is known that every computation can done securely when there is a majority of honest parties, or alternatively when the parties are given access to certain types of correlated secret randomness. However, the true cost of such secure computations remains wide open. The talk will survey some recent progress and open questions in this area.
Keywords :
computational complexity; information theory; security of data; computationally unbounded parties; correlated secret randomness; distributed computation; information theoretic secure computation complexity; secure channels; secure computation protocol; Abstracts; Complexity theory; Conferences; Information theory; Protocols;
Conference_Titel :
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location :
Lausanne
Print_ISBN :
978-1-4673-0224-1
Electronic_ISBN :
978-1-4673-0222-7
DOI :
10.1109/ITW.2012.6404768