We study the problem of interactive function computation by multiple parties possessing a single bit each in a differential privacy setting (i.e., there remains an uncertainty in any specific party’s bit even when given the transcript of the interactions and all the other parties ’ bits). Each party is interested in computing a function, which could differ from party to party, and there could be a central observer interested in computing a separate function. Performance at each party and the central observer is measured via the accuracy of the function computed. We allow for an arbitrary cost function to measure the distortion between the true and the computed function value. Our main result is the exact optimality of a simple non-interacti...
In this paper we study verifiable sampling from probability distributions in the context of multi-pa...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
There is a long history of the study of information-theoretic privacy within the context of communic...
Two parties, each holding one input of a two-variable function, communicate in order to determine th...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
We consider interactive computation of randomized functions between two users with the following pri...
) Oded Goldreich and Ronen Vainish Department of Computer Science Technion -- Israel Institute of T...
We study the maximal achievable accuracy of distributed differentially private protocols for a large...
We study the maximal achievable accuracy of distributed differentially private protocols for a large...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
We propose an efficient protocol for the evaluation of functions getting their inputs from multiple ...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
Abstract—A set of terminals that observe correlated data seek to compute functions of the data using...
We consider private function evaluation to provide query responses based on private data of multiple...
In this paper we study verifiable sampling from probability distributions in the context of multi-pa...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
There is a long history of the study of information-theoretic privacy within the context of communic...
Two parties, each holding one input of a two-variable function, communicate in order to determine th...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
We consider interactive computation of randomized functions between two users with the following pri...
) Oded Goldreich and Ronen Vainish Department of Computer Science Technion -- Israel Institute of T...
We study the maximal achievable accuracy of distributed differentially private protocols for a large...
We study the maximal achievable accuracy of distributed differentially private protocols for a large...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
We propose an efficient protocol for the evaluation of functions getting their inputs from multiple ...
. This paper improves on the classical results in unconditionally secure multi-party computation amo...
Abstract—A set of terminals that observe correlated data seek to compute functions of the data using...
We consider private function evaluation to provide query responses based on private data of multiple...
In this paper we study verifiable sampling from probability distributions in the context of multi-pa...
In a secure multi-party computation a set of mutually distrustful parties interact in order to evalu...
There is a long history of the study of information-theoretic privacy within the context of communic...