Secure computation of constant-depth circuits with applications to database search problems

作者: Omer Barkol , Yuval Ishai

DOI: 10.1007/11535218_24

关键词: k-nearest neighbors algorithmComputer scienceSearch problemComputational complexity theoryDiscrete mathematicsTheoretical computer scienceComputationServerSecure multi-party computationCryptography

摘要: Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, a circuit C of size s with an m-bit input x, obtain the following types protocols. – In setting where k≥polylog(s) servers hold and client holds protocol in which privately learns C(x) communicating O(m) bits each server. – x is arbitrarily distributed between parties who all know C, evaluating using O(m ·poly(k)) communication. Both tolerate t=k/polylog(s) dishonest their computational complexity nearly linear s. particular, are optimal “up to polylog factors” respect communication, local computation, minimal number participating parties. We then apply above results sublinear-communication natural problems. For instance, problem on n points {0,1}m get $k \approx \frac{1}{2} log n$ servers, server computation. Applying previous this would either require Ω(nm) Ω(m) super-polynomial

参考文章(36)
Moni Naor, Niv Gilboa, Benny Chor, Private Information Retrieval by Keywords CTIT technical reports series. ,(1997)
Oded Goldreich, Foundations of Cryptography: Basic Tools Cambridge University Press. ,(2000)
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Moses Charikar, Piotr Indyk, Rina Panigrahy, New Algorithms for Subset Query, Partial Match, Orthogonal Range Searching, and Related Problems international colloquium on automata languages and programming. pp. 451- 462 ,(2002) , 10.1007/3-540-45465-9_39
Ronald Cramer, Ivan Damgård, Ueli Maurer, General secure multi-party computation from any linear secret-sharing scheme theory and application of cryptographic techniques. ,vol. 2000, pp. 316- 334 ,(2000) , 10.1007/3-540-45539-6_22
Matthew Hennessy, Robin Milner, On Observing Nondeterminism and Concurrency international colloquium on automata, languages and programming. pp. 299- 309 ,(1980) , 10.1007/3-540-10003-2_79
Amos Beimel, Yuval Ishai, Information-Theoretic Private Information Retrieval: A Unified Construction international colloquium on automata languages and programming. pp. 912- 926 ,(2001) , 10.1007/3-540-48224-5_74
Donald Beaver, Joan Feigenbaum, Hiding instances in multioracle queries symposium on theoretical aspects of computer science. ,vol. 415, pp. 37- 48 ,(1990) , 10.1007/3-540-52282-4_30
D. Beaver, J. Feigenbaum, J. Kilian, P. Rogaway, Security with Low Communication Overhead international cryptology conference. pp. 62- 76 ,(1990) , 10.1007/3-540-38424-3_5
Yuval Ishai, Eyal Kushilevitz, Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials international colloquium on automata languages and programming. pp. 244- 256 ,(2002) , 10.1007/3-540-45465-9_22