DocumentCode
588306
Title
The complexity of information theoretic secure computation
Author
Ishai, Yuval
Author_Institution
Technion - Israel Inst. of Technol., Haifa, Israel
fYear
2012
fDate
3-7 Sept. 2012
Firstpage
80
Lastpage
80
Abstract
Summary form only given. A protocol for secure computation allows two or more parties to perform a distributed computation on their local inputs while hiding the inputs from each other. In the so-called “information theoretic” setting for secure computation, the parties are assumed to communicate over secure channels and the inputs should remain hidden even from computationally unbounded parties. It is known that every computation can done securely when there is a majority of honest parties, or alternatively when the parties are given access to certain types of correlated secret randomness. However, the true cost of such secure computations remains wide open. The talk will survey some recent progress and open questions in this area.
Keywords
computational complexity; information theory; security of data; computationally unbounded parties; correlated secret randomness; distributed computation; information theoretic secure computation complexity; secure channels; secure computation protocol; Abstracts; Complexity theory; Conferences; Information theory; Protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location
Lausanne
Print_ISBN
978-1-4673-0224-1
Electronic_ISBN
978-1-4673-0222-7
Type
conf
DOI
10.1109/ITW.2012.6404768
Filename
6404768
Link To Document