Skip to main content

1999 | OriginalPaper | Buchkapitel

The All-or-Nothing Nature of Two-Party Secure Computation

verfasst von : Amos Beimel, Tal Malkin, Silvio Micali

Erschienen in: Advances in Cryptology — CRYPTO’ 99

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

A function f is computationally securely computable if two computationally-bounded parties Alice, having a secret input x, and Bob, having a secret input y, can talk back and forth so that (even if one of them is malicious) (1) Bob learns essentially only f(x,y) while (2) Alice learns essentially nothing.We prove that, if any non-trivial function can be so computed, then so can every function. Consequently, the complexity assumptions sufficient and/or required for computationally securely computing f are the same for every non-trivial function f.

Metadaten
Titel
The All-or-Nothing Nature of Two-Party Secure Computation
verfasst von
Amos Beimel
Tal Malkin
Silvio Micali
Copyright-Jahr
1999
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-48405-1_6