2016
DOI: 10.1007/978-3-662-53008-5_16
|View full text |Cite
|
Sign up to set email alerts
|

On the Communication Required for Unconditionally Secure Multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…Indeed, the functions xor and and serve as basic building blocks for private protocols that rely on the boolean-circuit representation of f (more generally, addition and multiplication are used as building blocks for protocols that use the arithmetic-circuit representation of f ). In the context of lower bounds for communication complexity of private protocols, these building blocks also serve as the center of analysis (as a first step for a more general understanding), see, e.g., [8,9,10].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, the functions xor and and serve as basic building blocks for private protocols that rely on the boolean-circuit representation of f (more generally, addition and multiplication are used as building blocks for protocols that use the arithmetic-circuit representation of f ). In the context of lower bounds for communication complexity of private protocols, these building blocks also serve as the center of analysis (as a first step for a more general understanding), see, e.g., [8,9,10].…”
Section: Introductionmentioning
confidence: 99%
“…On the Lower Bounds of [IKM + 13, DNPR16]. It should be noted that our protocols do not follow the standard gate-by-gate design of unconditionally secure protocols in the correlated randomness model, hence our result does not contradict the lower bound of [DNPR16]. Moreover, our results apply only to circuits, while the implausibility result of [IKM + 13] assumes the existence of a low-storage protocols for evaluating any function, which our results do not provide.…”
Section: Our Methodsmentioning
confidence: 79%
“…For instance, it was mentioned in [DZ13] that "the results and evidence we know suggest that getting constant overhead [over the circuit size of the function] is the goal we can realistically hope to achieve". More recently in [DNPR16], the authors mentioned that "whether we can have constant round protocols and/or communication complexity much smaller than the size of the circuit and still be efficient (polynomial-time) in the circuit size of the function is a long-standing open problem".…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some results on lower bounds for communication complexity of gate-by-gate protocols for arithmetic circuits like ours were obtained by[DNPR16] but they do not seem to be enough to claim such optimality.…”
mentioning
confidence: 87%