A ZERO-ONE LAW FOR BOOLEAN PRIVACY

被引:93
作者
CHOR, B [1 ]
KUSHILEVITZ, E [1 ]
机构
[1] INT COMP SCI INST, BERKELEY, CA USA
关键词
PRIVATE DISTRIBUTED COMPUTATIONS; BOOLEAN FUNCTIONS;
D O I
10.1137/0404004
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A Boolean function f: A1 x A2 x ... x A(n)--> {0, 1} is t-private if there exists a protocol for computing f so that no coalition of size less-than-or-equal-to t can infer any additional information from the execution, other than the value of the function. It is shown that f is inverted-right-perpendicular n/2 inverted-left-perpendicular if and only if it can be represented as f(x1, x2,..., x(n)) = f1(x1) + f2(x2) +... + f(n)(x(n)), where the f(i) are arbitrary Boolean functions. It follows that if f is inverted-right-perpendicular n/2 inverted-left-perpendicular-private, then it is also n-private. Combining this with a result of Ben-Or, Goldwasser, and Wigderson, and of Chaum, Crepeau, and Damgard, [Proc. 20th Symposium on Theory of Computing, 1988, pp. 1-10 and pp. 11-19] an interesting "zero-one" law for private distributed computation of Boolean functions is derived: every Boolean function defined over a finite domain is either n-private, or it is right-perpendicular (n - 1)/2 left-perpendicular-private but not inverted-right-perpendicular n/2 left-inverted-perpendicular-private. A weaker notion of privacy is also investigated, where (a) coalitions are allowed to infer a limited amount of additional information, and (b) there is a probability of error in the final output of the protocol. It is shown that the same characterization of inverted-right-perpendicular n/2 inverted-left-perpendicular-private Boolean functions holds, even under these weaker requirements. In particular, this implies that for Boolean functions, the strong and the weak notions of privacy are equivalent.
引用
收藏
页码:36 / 47
页数:12
相关论文
共 8 条
[1]  
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[2]  
[Anonymous], 1988, P 20 ANN ACM S THEOR, DOI 10.1145/62212.62213
[3]  
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[4]  
BLAKLEY GR, 1981, 1981 P S SEC PRIV, P75
[5]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[6]  
CHOR B, IN PRESS ADV CRYPTOG
[7]   PROBABILISTIC COMMUNICATION COMPLEXITY [J].
PATURI, R ;
SIMON, J .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1986, 33 (01) :106-123
[8]  
Yao A. C., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P162, DOI 10.1109/SFCS.1986.25