Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND

被引:2
作者
Kushilevitz, Eyal [1 ]
Ostrovsky, Rafail [2 ,3 ]
Prouff, Emmanuel [4 ,7 ]
Rosen, Adi [5 ,6 ]
Thillard, Adrian [7 ]
Vergnaud, Damien [4 ]
机构
[1] Technion, Dept Comp Sci, Haifa, Israel
[2] UCLA, Dept Comp Sci, Los Angeles, CA 90024 USA
[3] UCLA, Dept Math, Los Angeles, CA 90024 USA
[4] Sorbonne Univ, CNRS, LIP6, Lab Informat Paris 6, Paris, France
[5] CNRS, Paris, France
[6] Univ Paris Diderot, Paris, France
[7] ANSSI, Paris, France
来源
THEORY OF CRYPTOGRAPHY, TCC 2019, PT II | 2019年 / 11892卷
关键词
TRADEOFF;
D O I
10.1007/978-3-030-36033-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider multi-party information-theoretic private protocols, and specifically their randomness complexity. The randomness complexity of private protocols is of interest both because random bits are considered a scarce resource, and because of the relation between that complexity measure and other complexity measures of boolean functions such as the circuit size or the sensitivity of the function being computed [12,17]. More concretely, we consider the randomness complexity of the basic boolean function and, that serves as a building block in the design of many private protocols. We show that and cannot be privately computed using a single random bit, thus giving the first non-trivial lower bound on the 1-private randomness complexity of an explicit boolean function, f : {0, 1}(n) -> {0, 1}. We further show that the function and, on any number of inputs n (one input bit per player), can be privately computed using 8 random bits (and 7 random bits in the special case of n = 3 players), improving the upper bound of 73 random bits implicit in [17]. Together with our lower bound, we thus approach the exact determination of the randomness complexity of and. To the best of our knowledge, the exact randomness complexity of private computation is not known for any explicit function (except for xor, which is trivially 1-random, and for several degenerate functions).
引用
收藏
页码:386 / 406
页数:21
相关论文
共 21 条
[1]   A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation [J].
Asharov, Gilad ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :58-151
[2]  
Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
[3]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]   Randomness complexity of private computation [J].
Blundo, C ;
De Santis, A ;
Persiano, G ;
Vaccaro, U .
COMPUTATIONAL COMPLEXITY, 1999, 8 (02) :145-168
[5]  
Blundo C, 1999, LECT NOTES COMPUT SC, V1693, P138
[6]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[7]   A COMMUNICATION-PRIVACY TRADEOFF FOR MODULAR ADDITION [J].
CHOR, B ;
KUSHILEVITZ, E .
INFORMATION PROCESSING LETTERS, 1993, 45 (04) :205-210
[8]   A ZERO-ONE LAW FOR BOOLEAN PRIVACY [J].
CHOR, B ;
KUSHILEVITZ, E .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 1991, 4 (01) :36-47
[9]   On the Communication Required for Unconditionally Secure Multiplication [J].
Damgard, Ivan ;
Nielsen, Jesper Buus ;
Polychroniadou, Antigoni ;
Raskin, Michael .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :459-488
[10]   Unconditionally Secure Computation with Reduced Interaction [J].
Damgard, Ivan ;
Nielsen, Jesper Buus ;
Ostrovsky, Rafail ;
Rosen, Adi .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :420-447