Secure multiparty computation of approximations

Joan Feigenbaum, Yuval Ishai, T. A.L. Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright

Research output: Contribution to journalArticlepeer-review

68 Scopus citations

Abstract

Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and may be extremely large. Furthermore, for some applications, the parties want to compute a function of their inputs securely without revealing more information than necessary. In this work, we study the question of simultaneously addressing the above efficiency and security concerns via what we call secure approximations. We start by extending standard definitions of secure (exact) computation to the setting of secure approximations. Our definitions guarantee that no additional information is revealed by the approximation beyond what follows from the output of the function being approximated. We then study the complexity of specific secure approximation problems. In particular, we obtain a sublinear-communication protocol for securely approximating the Hamming distance and a polynomial-time protocol for securely approximating the permanent and related #P-hard problems.

Original languageEnglish
Pages (from-to)435-472
Number of pages38
JournalACM Transactions on Algorithms
Volume2
Issue number3
DOIs
StatePublished - 2006

Keywords

  • Distributed data processing
  • Privacy
  • Sublinear communication

ASJC Scopus subject areas

  • Mathematics (miscellaneous)

Fingerprint

Dive into the research topics of 'Secure multiparty computation of approximations'. Together they form a unique fingerprint.

Cite this