2020
DOI: 10.48550/arxiv.2005.05111
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secure Computation to Hide Functions of Inputs

Abstract: We consider a two-user secure computation problem in which Alice and Bob communicate interactively in order to compute some deterministic functions of the inputs. The privacy requirement is that each user should not learn any additional information about a function of the inputs other than what can be inferred from its own input and output. For the distributionfree setting, i.e., when the protocol must be correct and private for any joint input distribution, we completely characterize the set of all securely c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 17 publications
(35 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?