An elementary completeness proof for secure two-party computation primitives

Ye Wang, Prakash Ishwar, Shantanu Rane
2014 2014 IEEE Information Theory Workshop (ITW 2014)  
In the secure two-party computation problem, two parties wish to compute a (possibly randomized) function of their inputs via an interactive protocol, while ensuring that neither party learns more than what can be inferred from only their own input and output. For semi-honest parties and informationtheoretic security guarantees, it is well-known that, if only noiseless communication is available, only a limited set of functions can be securely computed; however, if interaction is also allowed
more » ... er general communication primitives (multi-input/output channels), there are "complete" primitives that enable any function to be securely computed. The general set of complete primitives was characterized recently by Maji, Prabhakaran, and Rosulek leveraging an earlier specialized characterization by Kilian. Our contribution in this paper is a simple, self-contained, alternative derivation using elementary information-theoretic tools.
doi:10.1109/itw.2014.6970886 dblp:conf/itw/WangIR14 fatcat:axnbifdpuzhqpdvajo54q24bye