Full Characterization of Completeness for Two-party Randomized Function Evaluation
نویسندگان
چکیده
We close a long line of work that has pursued a full characterization of completeness of (possibly randomized) finite functions for 2-party computation that is secure against active adversaries. The first such function was discovered almost quarter of a century back (Kilian, FOCS 1988). Since then the question of which all finite 2-party functions are complete has been studied extensively, leading to characterizations in many special cases. In this work, we answer this problem in full. The main tools in our solution include: – a linear-algebraic characterization of redundancy in a 2-party function, – the notion of statistical testability (a version of interactive proofs in the informationtheoretic setting) and a result that evaluation of a 2-party function is statistically testable if and only if the function is redundancy free, and – an extension to the (weak) converse of Shannon’s channel coding theorem. Our main construction also gives a generalization of a line of work on obtaining protocols secure against active adversaries from protocols secure against passive adversaries in a black-box manner. ∗University of California, Los Angeles. Supported by NSF CI Postdoctoral Fellowship. [email protected]. †University of Illinois, Urbana-Champaign. Supported by NSF grant CNS 07-47027. [email protected].
منابع مشابه
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation
We settle a long standing open problem which has pursued a full characterization of completeness of (potentially randomized) finite functions for 2-party computation that is secure against active adversaries. Since the first such complete function was discovered [Kilian, FOCS 1988], the question of which finite 2-party functions are complete has been studied extensively, leading to characteriza...
متن کاملA Unified Characterization of Completeness and Triviality for Secure Function Evaluation
We present unified combinatorial characterizations of completeness for 2-party secure function evaluation (SFE) against passive and active corruptions in the information-theoretic setting, so that all known characterizations appear as special cases. In doing so we develop new technical concepts. We define several notions of isomorphism of SFE functionalities and define the “kernel” of an SFE fu...
متن کاملTowards Characterizing Securely Computable Two-Party Randomized Functions
A basic question of cryptographic complexity is to combinatorially characterize all randomized functions which have information-theoretic semi-honest secure 2-party computation protocols. The corresponding question for deterministic functions was answered almost three decades back, by Kushilevitz [Kus89]. In this work, we make progress towards understanding securely computable randomized functi...
متن کاملA Unified Characterization of Completeness and Triviality for Secure Function Evaluation
We present unified combinatorial characterizations of completeness for 2-party secure function evaluation (SFE) against passive and active corruptions in the information-theoretic setting, so that all known characterizations appear as special cases. In doing so we develop new technical concepts. We define several notions of isomorphism of SFE functionalities and define the “kernel” of an SFE fu...
متن کاملCompleteness in Two-Party Secure Computation Revisited
A Secure Function Evaluation (SFE) of a two-variable function f(·, ·) is a protocol that allows two parties with inputs x and y to evaluate f(x, y) in a manner where neither party learns “more than is necessary”. A rich body of work deals with the study of completeness for secure two-party computation. A function f is complete for SFE if a protocol for securely evaluating f allows the secure ev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012