• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Secure multiparty computation of approximations (2001)

Cached

  • Download as a PDF

Download Links

  • [www.cs.bgu.ac.il]
  • [www.cs.technion.ac.il]
  • [www.research.att.com]
  • [eprint.iacr.org]
  • [www.cs.yale.edu]
  • [www.wisdom.weizmann.ac.il]
  • [www.cs.yale.edu]
  • [www.cs.yale.edu]
  • [cs-www.cs.yale.edu]
  • [web.eecs.umich.edu]
  • [web.eecs.umich.edu]
  • [www.cs.rutgers.edu]
  • [www.cs.rutgers.edu]
  • [www.cs.stevens-tech.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Joan Feigenbaum , Yuval Ishai , Tal Malkin , Kobbi Nissim
Citations:106 - 25 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Feigenbaum01securemultiparty,
    author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim},
    title = {Secure multiparty computation of approximations},
    booktitle = {},
    year = {2001},
    pages = {927--938},
    publisher = {Springer-Verlag}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and may be extremely large. Furthermore, for some applications, the parties want to compute a function of their inputs securely, without revealing more information than necessary. In this work we study the question of simultaneously addressing the above efficiency and security concerns via what we call secure approximations. We start by extending standard definitions of secure (exact) computation to the setting of secure approximations. Our definitions guarantee that no additional information is revealed by the approximation beyond what follows from the output of the function being approximated. We then study the complexity of specific secure approximation problems. In particular, we obtain a sublinear-communication protocol for securely approximating the Hamming distance and a polynomial-time protocol for securely approximating the permanent and related #P-hard problems. 1

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University