Private computation: κ-connected versus 1-connected networks

8Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We study the role of connectivity of communication networks in private computations under information theoretical settings in the honest-but-curious model. We show that some functions can be 1-privately computed even if the underlying network is 1-connected but not 2-connected. Then we give a complete characterisation of non-degenerate functions that can be 1-privately computed on non-2-connected networks. Furthermore, we present a technique for simulating 1-private protocols that work on arbitrary (complete) networks on k-connected networks. For this simulation, at most (1 - k/(n - 1)) · L additional random bits are needed, where L is the number of bits exchanged in the original protocol and n is the number of players. Finally, we give matching lower and upper bounds for the number of random bits needed to compute the parity function on k-connected networks 1-privately, namely ⌈ (n - 2)/(k - 1) ⌉ - 1 random bits for networks consisting of n players. © 2005 International Association for Cryptologic Research.

References Powered by Scopus

PROTOCOLS FOR SECURE COMPUTATIONS.

3816Citations
N/AReaders
Get full text

HOW TO GENERATE AND EXCHANGE SECRETS.

3071Citations
N/AReaders
Get full text

Completeness theorems for non-cryptographic fault-tolerant distributed computation

2021Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Exploring the boundaries of topology-hiding computation

8Citations
N/AReaders
Get full text

Practical private information aggregation in large networks

8Citations
N/AReaders
Get full text

On private computation in incomplete networks

8Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Bläser, M., Jakoby, A., Liskiewicz, M., & Manthey, B. (2006). Private computation: κ-connected versus 1-connected networks. Journal of Cryptology, 19(3), 341–357. https://doi.org/10.1007/s00145-005-0329-x

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

77%

Professor / Associate Prof. 2

15%

Researcher 1

8%

Readers' Discipline

Tooltip

Computer Science 10

71%

Physics and Astronomy 2

14%

Design 1

7%

Medicine and Dentistry 1

7%

Save time finding and organizing research with Mendeley

Sign up for free