AbstractA common task in parallel processing is the distributed computation of a function by a number of processors, each of which possesses partial information relevant to the value of that function. In this paper we develop communication protocols which allow for such computation to take place while maintaining the value of the function secret to an eavesdropper. Of interest is the communication complexity of such protocols. We begin by considering two processors and two channels, one secret and one public, and present a protocol which minimizes the number of bits exchanged over the secret channel, while maintaining ε-uncertainty about the value of the function for the eavesdropper. We show that all binary functions can be kept ε-secret u...
We devise multi-party computation protocols for general secure function evaluation with the property...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
In the model that has become known as 'Perfectly Secure Message Transmission' (PSMT), a sender Alice...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
We consider a minimal scenario for secure computation: Parties A and B have private inputs x and y a...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Abstract—A set of terminals observe correlated data and seek to compute functions of the data using ...
Abstract. In secure two-party computation, two mutually distrusting parties are interested in jointl...
The growing influence of the Internet and other communication networks on our daily lives and on the...
Problems of secure communication and computation have been studied extensively in network models. Go...
AbstractIn the theory of dissemination of information in interconnection networks (gossiping and bro...
In the model that has become known as "Perfectly Secure Message Transmission"(PSMT), a sender Alice ...
We devise multi-party computation protocols for general secure function evaluation with the property...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
In the model that has become known as 'Perfectly Secure Message Transmission' (PSMT), a sender Alice...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
We consider a minimal scenario for secure computation: Parties A and B have private inputs x and y a...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Abstract—A set of terminals observe correlated data and seek to compute functions of the data using ...
Abstract. In secure two-party computation, two mutually distrusting parties are interested in jointl...
The growing influence of the Internet and other communication networks on our daily lives and on the...
Problems of secure communication and computation have been studied extensively in network models. Go...
AbstractIn the theory of dissemination of information in interconnection networks (gossiping and bro...
In the model that has become known as "Perfectly Secure Message Transmission"(PSMT), a sender Alice ...
We devise multi-party computation protocols for general secure function evaluation with the property...
We prove two classes of lower bounds on the communication complexity of information-theoretically se...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...