首页    期刊浏览 2024年11月28日 星期四
登录注册

文章基本信息

  • 标题:Computational Two-Party Correlation
  • 本地全文:下载
  • 作者:Iftach Haitner ; Kobbi Nissim ; Eran Omri
  • 期刊名称:Electronic Colloquium on Computational Complexity
  • 印刷版ISSN:1433-8092
  • 出版年度:2018
  • 卷号:2018
  • 出版社:Universität Trier, Lehrstuhl für Theoretische Computer-Forschung
  • 摘要:

    Let be an efficient two-party protocol that given security parameter , both parties output single bits X and Y , respectively. We are interested in how ( X Y ) ``appears'' to an efficient adversary that only views the transcript T . We make the following contributions:

    \begin{itemize} \item We develop new tools to argue about this loose notion, and show (modulo some caveats) that for every such protocol , there exists an efficient \textit{simulator} such that the following holds: on input T , the simulator outputs a pair ( X Y ) such that ( X Y T ) is (somewhat) \emph{computationally indistinguishable} from ( X Y T ) .

    \item We use these tools to prove the following \emph{dichotomy theorem}: every such protocol is: \begin{itemize} \item either \textit{uncorrelated} --- it is (somewhat) indistinguishable from an efficient protocol whose parties interact to produce T , but then choose their outputs \emph{independently} from some product distribution (that is determined in poly-time from T ),

    \item or, the protocol implies a key-agreement protocol (for infinitely many ). \end{itemize}

    Uncorrelated protocols are completely uninteresting from a cryptographic viewpoint, as the correlation between outputs is uninteresting. Our dichotomy shows that every protocol is either completely uninteresting or implies key-agreement.

    \item We use the above dichotomy to make progress on open problems on minimal cryptographic assumptions required for differentially private mechanisms for the XOR function.

    \item A subsequent work of \citeauthor{HaitnerMO18} uses the above dichotomy to makes progress on a long-standing open question regarding the complexity of fair two-party coin-flipping protocols. \end{itemize}

    \noindent We highlight the following two ideas regarding our technique: \begin{itemize} \item The simulator algorithm is obtained by a carefully designed ``competition'' between efficient algorithms attempting to forecast (( X Y ) T = t ) . The winner is used to simulate the outputs of the protocol. To the best of our knowledge, this idea has not been used before (at least in this context). \item Our key-agreement protocol uses the simulation to reduce to an information theoretic setup, and is in some sense non-black box. \end{itemize}

  • 关键词:differential privacy ; key agreement
国家哲学社会科学文献中心版权所有