A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Secure two-party computation in sublinear (amortized) time
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
Traditional approaches to generic secure computation begin by representing the function f being computed as a circuit. If f depends on each of its input bits, this implies a protocol with complexity at least linear in the input size. In fact, linear running time is inherent for non-trivial functions since each party must "touch" every bit of their input lest information about the other party's input be leaked. This seems to rule out many applications of secure computation (e.g., database
doi:10.1145/2382196.2382251
dblp:conf/ccs/GordonKKKM0V12
fatcat:jb3gri5gqrd6jfl6wuzq2t3dai