Header menu link for other important links
X
Lower bounds and optimal protocols for three-party secure computation
Published in Institute of Electrical and Electronics Engineers Inc.
2016
Volume: 2016-August
   
Pages: 1361 - 1365
Abstract
The problem of three-party secure computation, where a function of private data of two parties is to be computed by a third party without revealing information beyond respective inputs or outputs is considered. New and better lower bounds on the amount of communication required between the parties to guarantee zero probability of error in the computation and achieve information-theoretic security are derived. Protocols are presented and proved to be optimal in some cases by showing that they achieve the improved lower bounds. © 2016 IEEE.
About the journal
JournalData powered by TypesetIEEE International Symposium on Information Theory - Proceedings
PublisherData powered by TypesetInstitute of Electrical and Electronics Engineers Inc.
ISSN21578095
Open AccessNo
Concepts (12)
  •  related image
    Cryptography
  •  related image
    Data privacy
  •  related image
    Information theory
  •  related image
    Information- theoretic securities
  •  related image
    Lower bounds
  •  related image
    OPTIMAL PROTOCOLS
  •  related image
    Private data
  •  related image
    Probability of errors
  •  related image
    Secure computation
  •  related image
    THIRD PARTIES
  •  related image
    THREE-PARTY
  •  related image
    Computation theory