2005
DOI: 10.1007/11535218_24
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems

Abstract: Abstract. Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for a constant-depth circuit C of size s with an m-bit input x, we obtain the following types of protocols.-In a setting where k ≥ poly log(s) servers hold C and a client holdsx, we obtain a protocol in which the client privately learns C(x) by communicatingÕ(m) bits with each server. -In a setting where x is arbitrarily distrib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(29 citation statements)
references
References 32 publications
0
29
0
Order By: Relevance
“…The functionality inner-product over Z 2 (IP, for short) 9 is defined in the following way. It is a family of predicates with key space K n and index space I n consisting of binary strings of length n, and for any k ∈ K n , x ∈ I n the predicate IP(k, x) = 1 if and only if i∈[n] k i · x i = 0 mod 2.…”
Section: C2 Equivalence For Inner-product Over Zmentioning
confidence: 99%
“…The functionality inner-product over Z 2 (IP, for short) 9 is defined in the following way. It is a family of predicates with key space K n and index space I n consisting of binary strings of length n, and for any k ∈ K n , x ∈ I n the predicate IP(k, x) = 1 if and only if i∈[n] k i · x i = 0 mod 2.…”
Section: C2 Equivalence For Inner-product Over Zmentioning
confidence: 99%
“…This variant of the composition lemma is valid provided that there exist a universal simulator and universal decoder that work for all the r g 's. In this case, we say that the collection h rg (x; r h ) rg is a universal encoding [7] of g rg rg . Several known constructions of REs are universal.…”
Section: Fact 33 (Composition) Suppose Thatmentioning
confidence: 99%
“…We say that an REf (x; r, w) of f (x) has public coins w if part of the output off consists of the coins w, i.e., if we can writef (x; r, w) = (w, g(x, r, w)) for some function g. Moreover, we require a simulator Sim of a similar form; namely, given y (supposedly y = f (x)) and internal randomness (ρ, w), the output of Sim(y; ρ, w) can be written as (w, h(y, ρ, w)) for some function h. The notion of public coins RE has appeared in [7]. The public coins w can be chosen once and for all and be reused in different instantiations of REs as we will show in Facts 3.1-3.3 below.…”
Section: Randomized Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…Barkol and Ishai [2] design a communication-efficient secure multiparty protocol in which m parties share an input x, and all hold the same constantdepth circuit C. Parties then privately compute C(x). Let x = σ be an index shared between the parties and let circuit C hard-code elements of a database ∆ and return the x-th element as its output.…”
Section: Background and Related Workmentioning
confidence: 99%