The all-or-nothing nature of two-party secure computation

43Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

Abstract

A function f is computationally securely computable if two computationally-bounded parties Alice, having a secret input x, and Bob, having a secret input y, can talk back and forth so that (even if one of them is malicious) (1) Bob learns essentially only f (x,y) while (2) Alice learns essentially nothing. We prove that, if any non-trivial function can be so computed, then so can every function. Consequently, the complexity assumptions sufficient and/or required for computationally securely computing f are the same for every non-trivial function f.

Cite

CITATION STYLE

APA

Beimel, A., Malkin, T., & Micali, S. (1999). The all-or-nothing nature of two-party secure computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1666, pp. 80–97). Springer Verlag. https://doi.org/10.1007/3-540-48405-1_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free