TR2010-092

On Unconditionally Secure Computation with Vanishing Communication Cost


    •  Wang, Y., Rane, S., Sun, W., Ishwar, P., "On Unconditionally Secure Computation with Vanishing Communication Cost", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/​ALLERTON.2010.5707010, September 2010.
      BibTeX TR2010-092 PDF
      • @inproceedings{Wang2010sep,
      • author = {Wang, Y. and Rane, S. and Sun, W. and Ishwar, P.},
      • title = {On Unconditionally Secure Computation with Vanishing Communication Cost},
      • booktitle = {Allerton Conference on Communication, Control, and Computing},
      • year = 2010,
      • month = sep,
      • doi = {10.1109/ALLERTON.2010.5707010},
      • url = {https://www.merl.com/publications/TR2010-092}
      • }
  • MERL Contact:
  • Research Area:

    Information Security

Abstract:

We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalized sum-type function of those sequences. We construct three-party protocols that allow Charlie to compute the function with arbitrarily high accuracy, while maintaining unconditional privacy for Alice and Bob and achieving vanishing communication cost. This work leverages a striking dimensionality reduction that allows a high accuracy estimate to be produced from only random subsampling of the sequences. The worst-case distortion of the estimate, across all arbitrary deterministic sequences of any length, is independent of the dimensionality (length) of the sequences and proportional to inverse square root of the number of samples that the estimate is based upon.

 

  • Related News & Events