Abstract
A function f is computationally securely computable if two computationally-bounded parties Alice, having a secret input x, and Bob, having a secret input y, can talk back and forth so that (even if one of them is malicious) (1) Bob learns essentially only f (x,y) while (2) Alice learns essentially nothing. We prove that, if any non-trivial function can be so computed, then so can every function. Consequently, the complexity assumptions sufficient and/or required for computationally securely computing f are the same for every non-trivial function f.
Cite
CITATION STYLE
Beimel, A., Malkin, T., & Micali, S. (1999). The all-or-nothing nature of two-party secure computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1666, pp. 80–97). Springer Verlag. https://doi.org/10.1007/3-540-48405-1_6
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.