We consider a minimal scenario for secure computation: Parties A and B have private inputs x and y and a shared random string r. A and B are each allowed to send a single message to a third party C, from which C is to learn the value of f(x, y) for some function f, but nothing else. We show that this model is surprisingly powerful: every function f can be securely computed in this fashion. If the messages are required to be of polynomial size, then we exhibit an efficient protocol for any function f computable in nondeterministic logspace. Using a computational notion of security, we exhibit efficient protocols for any polynomial-time computable function f, assuming the existence of one-way functions. The above results generalize to the cas...
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
. A function f is computationally securely computable if two computationally-bounded parties Alice, ...
A function f is computationally securely computable if two computationally-bounded parties Alice, ha...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
We revisit A.C. Yao's classic problem of secure function computation by interactive communication, i...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
. A function f is computationally securely computable if two computationally-bounded parties Alice, ...
A function f is computationally securely computable if two computationally-bounded parties Alice, ha...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
We revisit A.C. Yao's classic problem of secure function computation by interactive communication, i...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....
The notion of non-interactive secure computation (NISC) first introduced in the work of Ishai et al....