Skip to main content

Privacy for multi-party protocols

  • Conference paper
  • First Online:
Book cover Advances in Cryptology — AUSCRYPT '92 (AUSCRYPT 1992)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 718))

  • 170 Accesses

Abstract

We initiate information theoretic investigation of the amount of leaked information in multi-party protocols. It is shown that mutual information is a satisfactory measure of the amount of the leaked information. For more than two parties, we apply multi-terminal information theory and give a formulation of the leaked information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bar-Yehuda, R., Chor, B., Kushilevitz, E.: Privacy, additional information, and communication. Proceedings 5 Annual Structure in Complexity Theory Conference (1990) 55–65

    Google Scholar 

  2. Ben-or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. Proc. 20th ACM Annual Symposium on Theory of Computing (1988) 1–10

    Google Scholar 

  3. Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy. Proc. 21st ACM Annual Symposium on Theory of Computing (1989) 62–72

    Google Scholar 

  4. Cover, T. M.: A proof of the data compression theorem of Slepian and Wolf for ergodic sources. IEEE Trans. Inform. Theory IT-21 (1975) 226–228

    Google Scholar 

  5. Gallager, R. G.: Information Theory and Reliable Communication. John Wiley & Sons, New York (1968).

    Google Scholar 

  6. Kushilevitz, E.: Privacy and communication complexity. SIAM Journal on Discrete Mathematics 5 (1992) 273–284 (preliminary version in Proc. 30th FOCS (1989) 416–421)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Satoh, T., Kurosawa, K., Tsujii, S. (1993). Privacy for multi-party protocols. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_67

Download citation

  • DOI: https://doi.org/10.1007/3-540-57220-1_67

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57220-6

  • Online ISBN: 978-3-540-47976-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics