Skip to main content

Randomness Recycling in Constant-Round Private Computations

(Extended Abstract)

  • Conference paper
  • First Online:
Distributed Computing (DISC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1693))

Included in the following conference series:

Abstract

In this paper we study the randomness complexity needed to distributively perform k XOR computation in a t-private way using constant-round protocols.

We show that cover-free families allow the recycling of random bits for constant-round private protocols. More precisely, we show that after an 1-round initialization phase during which random bits are distributed among the players, it is possible to perform each of k XOR computations using 2-rounds of communication. In each phase the random bits are used according to a cover-free family and this allows to use each random bit for more than one computation.

For t = 2, we design a protocol that uses O(n log k) random bits in- stead of O(nk) bits if no recycling is performed. More generally, if t > 1 then O(kt 2 log n) random bits are sufficient to accomplisht his task, for t = O(n ½—є) for constant є > 0 .

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of round of interaction. In Proceedings of 8th ACM Symposium on Principles of Distributed Computing, pages 36–44, 1989.

    Google Scholar 

  2. D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Advances in Cryptology–CRYPTO 90, pages 62–76, 1990.

    Google Scholar 

  3. D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In Proceedings of 22th Symposium on Theory of Computation, pages 503–513, 1990.

    Google Scholar 

  4. M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proceedings of 20th Symposium on Theory of Computation, pages 1–10, 1988.

    Google Scholar 

  5. C. Blundo, A. De Santis, G. Persiano, and U. Vaccaro. Randomness complexity of private multiparty protocols. To appear in Computational Complexity (preliminary version ICALP 95), 1998.

    Google Scholar 

  6. D. Chaum, C. Crepeau, and I. Damgärd. Multiparty unconditionally secure protocols. In Proceedings of 20th Symposium on Theory of Computation, pages 11–19, 1988.

    Google Scholar 

  7. B. Chor and E. Kushilevitz. A communication-privacy tradeoff for modular addition. Information Processing Letters, 45:205–210, 1991.

    Article  MathSciNet  Google Scholar 

  8. B. Chor and E. Kushilevitz. A zero-one law for boolean privacy. SIAM Journal of Disc. Mat., 4(1):36–46, 1991.

    Article  MATH  MathSciNet  Google Scholar 

  9. D.Z. Du and F.K. Hwang. Combinatorial Groups Testing and its Applications. World Scientific, Singapore, 1993.

    Google Scholar 

  10. P. Erdös, P. Frankl, and Z. Füredi. Families of finite sets in which no set is covered by the union of r others. Israel Journal of Mathematics, 51:79–89, 1985.

    Article  MATH  MathSciNet  Google Scholar 

  11. E. Kushilevitz and Y. Mansour. Small sample spaces and privacy. In Proceedings of 15th ACM Symposium on Principles of Distributed Computing, 1996.

    Google Scholar 

  12. E. Kushilevitz, R. Ostrovsky, and A. Rosèn. Characterizing linear size circuit in terms of privacy. In Proceedings of 28th ACM Symposium on Theory of Computing, 1996.

    Google Scholar 

  13. E. Kushilevitz, R. Ostrovsky, and A. Rosèn. Amortizing randomness in private multiparty computations. In Proc. Seventeenth ACM Symposium on Principles of Distributed Computing, 1998.

    Google Scholar 

  14. E. Kushilevitz and A. Rosèn. A randomness-round tradeoff in private computation. SIAM Journal of Disc. Mat., 11(1):61–80, 1998.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blundo, C., Galdi, C., Persiano, P. (1999). Randomness Recycling in Constant-Round Private Computations. In: Jayanti, P. (eds) Distributed Computing. DISC 1999. Lecture Notes in Computer Science, vol 1693. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48169-9_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-48169-9_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66531-1

  • Online ISBN: 978-3-540-48169-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics