We study the role of connectivity of communication networks in private computations under information theoretical settings in the honest-but-curious model. We show that some functions can be 1-privately computed even if the underlying network is 1-connected but not 2-connected. Then we give a complete characterisation of non-degenerate functions that can be 1-privately computed on non-2-connected networks. Furthermore, we present a technique for simulating 1-private protocols that work on arbitrary (complete) networks on k-connected networks. For this simulation, at most (1 - k/(n - 1)) · L additional random bits are needed, where L is the number of bits exchanged in the original protocol and n is the number of players. Finally, we give matching lower and upper bounds for the number of random bits needed to compute the parity function on k-connected networks 1-privately, namely ⌈ (n - 2)/(k - 1) ⌉ - 1 random bits for networks consisting of n players. © 2005 International Association for Cryptologic Research.
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Bläser, M., Jakoby, A., Liskiewicz, M., & Manthey, B. (2006). Private computation: κ-connected versus 1-connected networks. Journal of Cryptology, 19(3), 341–357. https://doi.org/10.1007/s00145-005-0329-x