Secure two-party computation in sublinear (amortized) time

Secure two-party computation Sublinear function
DOI: 10.1145/2382196.2382251 Publication Date: 2012-10-15T17:13:12Z
ABSTRACT
Traditional approaches to generic secure computation begin by representing the function f being computed as a circuit. If depends on each of its input bits, this implies protocol with complexity at least linear in size. In fact, running time is inherent for non-trivial functions since party must "touch" every bit their lest information about other party's be leaked. This seems rule out many applications (e.g., database search) scenarios where inputs are huge.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (23)
CITATIONS (114)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....