Can Alice and Bob Guarantee Output to Carol?

Bar Alon, Eran Omri, Muthuramakrishnan Venkitasubramaniam

نتاج البحث: فصل من :كتاب / تقرير / مؤتمرمنشور من مؤتمرمراجعة النظراء

ملخص

In the setting of solitary output computations, only a single designated party learns the output of some function applied to the private inputs of all participating parties with the guarantee that nothing beyond the output is revealed. The setting of solitary output functionalities is a special case of secure multiparty computation, which allows a set of mutually distrusting parties to compute some function of their private inputs. The computation should guarantee some security properties, such as correctness, privacy, fairness, and output delivery. Full security captures all these properties together. Solitary output computation is a common setting that has become increasingly important, as it is relevant to many real-world scenarios, such as federated learning and set disjointness. In the set-disjointness problem, a set of parties with private datasets wish to convey to another party whether they have a common input. In this work, we investigate the limits of achieving set-disjointness which already has numerous applications and whose feasibility (under non-trivial conditions) was left open in the work of Halevi et al. (TCC 2019). Towards resolving this, we completely characterize the set of Boolean functions that can be computed in the three-party setting in the face of a malicious adversary that corrupts up to two of the parties. As a corollary, we characterize the family of set-disjointness functions that can be computed in this setting, providing somewhat surprising results regarding this family and resolving the open question posed by Halevi et al.

اللغة الأصليةالإنجليزيّة
عنوان منشور المضيفAdvances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings
المحررونMarc Joye, Gregor Leander
ناشرSpringer Science and Business Media Deutschland GmbH
الصفحات32-61
عدد الصفحات30
رقم المعيار الدولي للكتب (المطبوع)9783031587399
المعرِّفات الرقمية للأشياء
حالة النشرنُشِر - 2024
الحدث43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 - Zurich, سويسرا
المدة: ٢٦ مايو ٢٠٢٤٣٠ مايو ٢٠٢٤

سلسلة المنشورات

الاسمLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
مستوى الصوت14655 LNCS
رقم المعيار الدولي للدوريات (المطبوع)0302-9743
رقم المعيار الدولي للدوريات (الإلكتروني)1611-3349

!!Conference

!!Conference43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024
الدولة/الإقليمسويسرا
المدينةZurich
المدة٢٦/٠٥/٢٤٣٠/٠٥/٢٤

بصمة

أدرس بدقة موضوعات البحث “Can Alice and Bob Guarantee Output to Carol?'. فهما يشكلان معًا بصمة فريدة.

قم بذكر هذا