skip to main content
10.1145/2554797.2554812acmconferencesArticle/Chapter ViewAbstractPublication PagesitcsConference Proceedingsconference-collections
research-article

Private interactive communication across an adversarial channel

Authors Info & Claims
Published:12 January 2014Publication History

ABSTRACT

Consider two parties Alice and Bob, who hold private inputs x and y, and wish to compute a function f(x, y) privately in the information theoretic sense; that is, each party should learn nothing beyond f(x, y). However, the communication channel available to them is noisy. This means that the channel can introduce errors in the transmission between the two parties. Moreover, the channel is adversarial in the sense that it knows the protocol that Alice and Bob are running, and maliciously introduces errors to disrupt the communication, subject to some bound on the total number of errors. A fundamental question in this setting is to design a protocol that remains private in the presence of large number of errors.

If Alice and Bob are only interested in computing f(x, y) correctly, and not privately, then quite robust protocols are known that can tolerate a constant fraction of errors. However, none of these solutions is applicable in the setting of privacy, as they inherently leak information about the parties' inputs. This leads to the question whether we can simultaneously achieve privacy and error-resilience against a constant fraction of errors.

We show that privacy and error-resilience are contradictory goals. In particular, we show that for every constant c > 0, there exists a function f which is privately computable in the error-less setting, but for which no private and correct protocol is resilient against a c-fraction of errors. The same impossibility holds also for sub-constant noise rate, e.g., when c is exponentially small (as a function of the input size).

References

  1. D. Beaver. Perfect privacy for two-party protocols. Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65--77. 1991.Google ScholarGoogle ScholarCross RefCross Ref
  2. Z. Brakerski and Y. T. Kalai. Efficient interactive coding against adversarial noise. FOCS '12, pp. 160--166. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Z. Brakerski and M. Naor. Fast algorithms for interactive coding. SODA '13, pp. 443--456. 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Braverman and A. Rao. Towards coding for maximum errors in interactive communication. STOC '11, pp. 159--166. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Crépeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions. FOCS '88, pp. 42--52. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Chor and E. Kushilevitz. A zero-one law for boolean privacy. SIAM Journal on Discrete Mathematics, 4(1):36--47, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K.-M. Chung, R. Pass, and S. Telang. Knowledge-preserving interactive coding. FOCS '13, pp. 449--458. 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. Damgård, S. Fehr, K. Morozov, and L. Salvail. Unfair noisy channels and oblivious transfer. M. Naor, ed., Theory of Cryptography, LNCS, vol. 2951, pp. 355--373. Springer Berlin, 2004.Google ScholarGoogle Scholar
  9. M. Franklin, R. Gelles, R. Ostrovsky, and L. J. Schulman. Optimal coding for streaming authentication and interactive communication. R. Canetti and J. A. Garay, eds., Advances in Cryptology - CRYPTO 2013, LNCS, vol. 8043. Springer Berlin, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. Gelles, A. Moitra, and A. Sahai. Efficient and explicit coding for interactive communication. FOCS '11, pp. 768--777. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Gelles, A. Sahai, and A. Wadia. Private interactive communication across an adversarial channel. Cryptology ePrint Archive, Report 2013/259, 2013.Google ScholarGoogle Scholar
  12. J. Kilian. Founding crytpography on oblivious transfer. STOC '88, pp. 20--31. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Kushilevitz. Privacy and communication complexity. FOCS '89, pp. 416--421. IEEE Computer Society, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Kushilevitz. Privacy and communication complexity. SIAM Journal on Discrete Mathematics, 5(2):273--284, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. K. Maji, M. Prabhakaran, and M. Rosulek. Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation. O. Reingold, ed., Theory of Cryptography, LNCS, vol. 5444, pp. 256--273. Springer Berlin, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Rajagopalan and L. Schulman. A coding theorem for distributed computation. STOC '94, pp. 790--799. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. L. J. Schulman. Deterministic coding for interactive communication. STOC '93, pp. 747--756. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. J. Schulman. Coding for interactive communication. IEEE Transactions on Information Theory, 42(6):1745--1756, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. E. Shannon. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1):3--55, 2001. Originally appeared in Bell System Tech. J. 27:379--423, 623--656, 1948. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 16(1):8--37, 1961.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Private interactive communication across an adversarial channel

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ITCS '14: Proceedings of the 5th conference on Innovations in theoretical computer science
          January 2014
          566 pages
          ISBN:9781450326988
          DOI:10.1145/2554797
          • Program Chair:
          • Moni Naor

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 January 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ITCS '14 Paper Acceptance Rate48of116submissions,41%Overall Acceptance Rate172of513submissions,34%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader