2009
DOI: 10.1007/978-3-642-00457-5_16
|View full text |Cite
|
Sign up to set email alerts
|

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation

Abstract: In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both parties wish to securely compute f (x, y). We show several new results classifying the feasibility of securely implementing these functions in several security settings. Namely, we give new alternate characterizations of the functions that have (statistically) secure protocols against passive and active (standalone), computationally unbounded adversaries. We also show a strict, infinite hierarchy of complexity fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
46
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 36 publications
(47 citation statements)
references
References 18 publications
1
46
0
Order By: Relevance
“…We then use the combinatorial characterizations of Symmetric Secure Function Evaluation (SSFE) functionalities (obtained using frontier analysis) from [16] to extend the result to arbitrary SSFE functionalities (instead of just XOR). Further, using an extension of a result in [12], we extend this to arbitrary SFE functionalities by associating a symmetric SFE with every general SFE that has a secure protocol using a source of common randomness.…”
Section: Overviewmentioning
confidence: 99%
See 4 more Smart Citations
“…We then use the combinatorial characterizations of Symmetric Secure Function Evaluation (SSFE) functionalities (obtained using frontier analysis) from [16] to extend the result to arbitrary SSFE functionalities (instead of just XOR). Further, using an extension of a result in [12], we extend this to arbitrary SFE functionalities by associating a symmetric SFE with every general SFE that has a secure protocol using a source of common randomness.…”
Section: Overviewmentioning
confidence: 99%
“…The analysis of protocols in [6,1,14] also have some elements of a frontier analysis, but of a rudimentary form which was sufficient for analysis of perfect security. In [16] frontier analysis was explicitly introduced and used to prove several protocol impossibility results and characterizations. [13] also presented similar results and used somewhat similar techniques (but relied on analyzing the protocol by rounds, instead of frontiers, and suffered limitations on the round complexity of the protocols for which the impossibility could be shown).…”
Section: Overviewmentioning
confidence: 99%
See 3 more Smart Citations