Communication and Randomness Lower Bounds for Secure Computation Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1109/tit.2016.2568207
In secure multiparty computation (MPC), mutually distrusting users\ncollaborate to compute a function of their private data without revealing any\nadditional information about their data to other users. While it is known that\ninformation theoretically secure MPC is possible among $n$ users (connected by\nsecure and noiseless links and have access to private randomness) against the\ncollusion of less than $n/2$ users in the honest-but-curious model, relatively\nless is known about the communication and randomness complexity of secure\ncomputation.\n In this work, we employ information theoretic techniques to obtain lower\nbounds on the amount of communication and randomness required for secure MPC.\nWe restrict ourselves to a concrete interactive setting involving 3 users under\nwhich all functions are securely computable against corruption of a single user\nin the honest-but-curious model. We derive lower bounds for both the perfect\nsecurity case (i.e., zero-error and no leakage of information) and asymptotic\nsecurity (where the probability of error and information leakage vanish as\nblock-length goes to $\\infty$).\n Our techniques include the use of a data processing inequality for residual\ninformation (i.e., the gap between mutual information and G\\'acs-K\\"orner\ncommon information), a new information inequality for 3-user protocols, and the\nidea of distribution switching. Our lower bounds are shown to be tight for\nvarious functions of interest. In particular, we show concrete functions which\nhave "communication-ideal" protocols, i.e., which achieve the minimum\ncommunication simultaneously on all links in the network, and also use minimum\namount of randomness. Also, we obtain the first explicit example of a function\nthat incurs a higher communication cost than the input length in the secure\ncomputation model of "Feige, Kilian, and Naor [STOC, 1994]", who had shown that\nsuch functions exist.\n
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/tit.2016.2568207
- OA Status
- green
- Cited By
- 34
- References
- 67
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2197751114
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2197751114Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/tit.2016.2568207Digital Object Identifier
- Title
-
Communication and Randomness Lower Bounds for Secure ComputationWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-05-13Full publication date if available
- Authors
-
Deepesh Data, Vinod M. Prabhakaran, Manoj PrabhakaranList of authors in order
- Landing page
-
https://doi.org/10.1109/tit.2016.2568207Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/1512.07735Direct OA link when available
- Concepts
-
Randomness, Communication complexity, Computer science, Secure multi-party computation, Secure communication, Information leakage, Information theory, Private information retrieval, Theoretical computer science, Computation, Cryptography, Secure two-party computation, Security parameter, Mathematics, Computer network, Algorithm, Computer security, Encryption, StatisticsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
34Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 2, 2024: 2, 2023: 5, 2022: 6, 2021: 7Per-year citation counts (last 5 years)
- References (count)
-
67Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2197751114 |
|---|---|
| doi | https://doi.org/10.1109/tit.2016.2568207 |
| ids.doi | https://doi.org/10.1109/tit.2016.2568207 |
| ids.mag | 2197751114 |
| ids.openalex | https://openalex.org/W2197751114 |
| fwci | 2.25501503 |
| type | article |
| title | Communication and Randomness Lower Bounds for Secure Computation |
| awards[0].id | https://openalex.org/G2311759962 |
| awards[0].funder_id | https://openalex.org/F4320306076 |
| awards[0].display_name | |
| awards[0].funder_award_id | 12-28856 |
| awards[0].funder_display_name | National Science Foundation |
| biblio.issue | 7 |
| biblio.volume | 62 |
| biblio.last_page | 3929 |
| biblio.first_page | 3901 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T10720 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987000226974487 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1703 |
| topics[1].subfield.display_name | Computational Theory and Mathematics |
| topics[1].display_name | Complexity and Algorithms in Graphs |
| topics[2].id | https://openalex.org/T10764 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9948999881744385 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Privacy-Preserving Technologies in Data |
| funders[0].id | https://openalex.org/F4320306076 |
| funders[0].ror | https://ror.org/021nxhr62 |
| funders[0].display_name | National Science Foundation |
| funders[1].id | https://openalex.org/F4320308943 |
| funders[1].ror | https://ror.org/00d0nc645 |
| funders[1].display_name | Microsoft Research |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C125112378 |
| concepts[0].level | 2 |
| concepts[0].score | 0.813428521156311 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q176640 |
| concepts[0].display_name | Randomness |
| concepts[1].id | https://openalex.org/C179145077 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6919044852256775 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q5154130 |
| concepts[1].display_name | Communication complexity |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6246249675750732 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C18396474 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5591809749603271 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2465888 |
| concepts[3].display_name | Secure multi-party computation |
| concepts[4].id | https://openalex.org/C510870077 |
| concepts[4].level | 3 |
| concepts[4].score | 0.5322116613388062 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q7444868 |
| concepts[4].display_name | Secure communication |
| concepts[5].id | https://openalex.org/C2779201187 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5202992558479309 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2775060 |
| concepts[5].display_name | Information leakage |
| concepts[6].id | https://openalex.org/C52622258 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5201342701911926 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q131222 |
| concepts[6].display_name | Information theory |
| concepts[7].id | https://openalex.org/C99221444 |
| concepts[7].level | 2 |
| concepts[7].score | 0.510040819644928 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1532069 |
| concepts[7].display_name | Private information retrieval |
| concepts[8].id | https://openalex.org/C80444323 |
| concepts[8].level | 1 |
| concepts[8].score | 0.5073196291923523 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[8].display_name | Theoretical computer science |
| concepts[9].id | https://openalex.org/C45374587 |
| concepts[9].level | 2 |
| concepts[9].score | 0.46822071075439453 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q12525525 |
| concepts[9].display_name | Computation |
| concepts[10].id | https://openalex.org/C178489894 |
| concepts[10].level | 2 |
| concepts[10].score | 0.45294493436813354 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[10].display_name | Cryptography |
| concepts[11].id | https://openalex.org/C13652956 |
| concepts[11].level | 4 |
| concepts[11].score | 0.4315924048423767 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7444883 |
| concepts[11].display_name | Secure two-party computation |
| concepts[12].id | https://openalex.org/C2776711565 |
| concepts[12].level | 3 |
| concepts[12].score | 0.4107486605644226 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7445058 |
| concepts[12].display_name | Security parameter |
| concepts[13].id | https://openalex.org/C33923547 |
| concepts[13].level | 0 |
| concepts[13].score | 0.3047371506690979 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[13].display_name | Mathematics |
| concepts[14].id | https://openalex.org/C31258907 |
| concepts[14].level | 1 |
| concepts[14].score | 0.26011186838150024 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[14].display_name | Computer network |
| concepts[15].id | https://openalex.org/C11413529 |
| concepts[15].level | 1 |
| concepts[15].score | 0.24140256643295288 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[15].display_name | Algorithm |
| concepts[16].id | https://openalex.org/C38652104 |
| concepts[16].level | 1 |
| concepts[16].score | 0.206650972366333 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[16].display_name | Computer security |
| concepts[17].id | https://openalex.org/C148730421 |
| concepts[17].level | 2 |
| concepts[17].score | 0.18114179372787476 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[17].display_name | Encryption |
| concepts[18].id | https://openalex.org/C105795698 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q12483 |
| concepts[18].display_name | Statistics |
| keywords[0].id | https://openalex.org/keywords/randomness |
| keywords[0].score | 0.813428521156311 |
| keywords[0].display_name | Randomness |
| keywords[1].id | https://openalex.org/keywords/communication-complexity |
| keywords[1].score | 0.6919044852256775 |
| keywords[1].display_name | Communication complexity |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6246249675750732 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/secure-multi-party-computation |
| keywords[3].score | 0.5591809749603271 |
| keywords[3].display_name | Secure multi-party computation |
| keywords[4].id | https://openalex.org/keywords/secure-communication |
| keywords[4].score | 0.5322116613388062 |
| keywords[4].display_name | Secure communication |
| keywords[5].id | https://openalex.org/keywords/information-leakage |
| keywords[5].score | 0.5202992558479309 |
| keywords[5].display_name | Information leakage |
| keywords[6].id | https://openalex.org/keywords/information-theory |
| keywords[6].score | 0.5201342701911926 |
| keywords[6].display_name | Information theory |
| keywords[7].id | https://openalex.org/keywords/private-information-retrieval |
| keywords[7].score | 0.510040819644928 |
| keywords[7].display_name | Private information retrieval |
| keywords[8].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[8].score | 0.5073196291923523 |
| keywords[8].display_name | Theoretical computer science |
| keywords[9].id | https://openalex.org/keywords/computation |
| keywords[9].score | 0.46822071075439453 |
| keywords[9].display_name | Computation |
| keywords[10].id | https://openalex.org/keywords/cryptography |
| keywords[10].score | 0.45294493436813354 |
| keywords[10].display_name | Cryptography |
| keywords[11].id | https://openalex.org/keywords/secure-two-party-computation |
| keywords[11].score | 0.4315924048423767 |
| keywords[11].display_name | Secure two-party computation |
| keywords[12].id | https://openalex.org/keywords/security-parameter |
| keywords[12].score | 0.4107486605644226 |
| keywords[12].display_name | Security parameter |
| keywords[13].id | https://openalex.org/keywords/mathematics |
| keywords[13].score | 0.3047371506690979 |
| keywords[13].display_name | Mathematics |
| keywords[14].id | https://openalex.org/keywords/computer-network |
| keywords[14].score | 0.26011186838150024 |
| keywords[14].display_name | Computer network |
| keywords[15].id | https://openalex.org/keywords/algorithm |
| keywords[15].score | 0.24140256643295288 |
| keywords[15].display_name | Algorithm |
| keywords[16].id | https://openalex.org/keywords/computer-security |
| keywords[16].score | 0.206650972366333 |
| keywords[16].display_name | Computer security |
| keywords[17].id | https://openalex.org/keywords/encryption |
| keywords[17].score | 0.18114179372787476 |
| keywords[17].display_name | Encryption |
| language | en |
| locations[0].id | doi:10.1109/tit.2016.2568207 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S4502562 |
| locations[0].source.issn | 0018-9448, 1557-9654 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0018-9448 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IEEE Transactions on Information Theory |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Transactions on Information Theory |
| locations[0].landing_page_url | https://doi.org/10.1109/tit.2016.2568207 |
| locations[1].id | pmh:oai:arXiv.org:1512.07735 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | https://arxiv.org/pdf/1512.07735 |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://arxiv.org/abs/1512.07735 |
| indexed_in | arxiv, crossref |
| authorships[0].author.id | https://openalex.org/A5023777978 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-3544-8414 |
| authorships[0].author.display_name | Deepesh Data |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I11947397 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India |
| authorships[0].institutions[0].id | https://openalex.org/I11947397 |
| authorships[0].institutions[0].ror | https://ror.org/03ht1xw27 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I11947397, https://openalex.org/I2799351866, https://openalex.org/I3149292468 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Tata Institute of Fundamental Research |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Deepesh Data |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India |
| authorships[1].author.id | https://openalex.org/A5045516299 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7505-5303 |
| authorships[1].author.display_name | Vinod M. Prabhakaran |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I11947397 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India |
| authorships[1].institutions[0].id | https://openalex.org/I11947397 |
| authorships[1].institutions[0].ror | https://ror.org/03ht1xw27 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I11947397, https://openalex.org/I2799351866, https://openalex.org/I3149292468 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Tata Institute of Fundamental Research |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Vinod M. Prabhakaran |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India |
| authorships[2].author.id | https://openalex.org/A5023747811 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Manoj Prabhakaran |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I157725225 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, University of Illinois, Urbana–Champaign, Urbana, IL, USA |
| authorships[2].institutions[0].id | https://openalex.org/I157725225 |
| authorships[2].institutions[0].ror | https://ror.org/047426m28 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I157725225 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | University of Illinois Urbana-Champaign |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Manoj M. Prabhakaran |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, University of Illinois, Urbana–Champaign, Urbana, IL, USA |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/1512.07735 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Communication and Randomness Lower Bounds for Secure Computation |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2886283651, https://openalex.org/W4293056000, https://openalex.org/W2952477979, https://openalex.org/W2952662274, https://openalex.org/W4365143614, https://openalex.org/W4285248495, https://openalex.org/W2188119083, https://openalex.org/W4206242289, https://openalex.org/W2990282446, https://openalex.org/W1576843907 |
| cited_by_count | 34 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 2 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 5 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 6 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 7 |
| counts_by_year[5].year | 2020 |
| counts_by_year[5].cited_by_count | 3 |
| counts_by_year[6].year | 2019 |
| counts_by_year[6].cited_by_count | 4 |
| counts_by_year[7].year | 2018 |
| counts_by_year[7].cited_by_count | 2 |
| counts_by_year[8].year | 2016 |
| counts_by_year[8].cited_by_count | 2 |
| counts_by_year[9].year | 2015 |
| counts_by_year[9].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:1512.07735 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/1512.07735 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/1512.07735 |
| primary_location.id | doi:10.1109/tit.2016.2568207 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S4502562 |
| primary_location.source.issn | 0018-9448, 1557-9654 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0018-9448 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IEEE Transactions on Information Theory |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Transactions on Information Theory |
| primary_location.landing_page_url | https://doi.org/10.1109/tit.2016.2568207 |
| publication_date | 2016-05-13 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W2071801393, https://openalex.org/W2151877312, https://openalex.org/W1584785281, https://openalex.org/W1996403876, https://openalex.org/W2104886711, https://openalex.org/W2092730076, https://openalex.org/W2157086200, https://openalex.org/W1575461960, https://openalex.org/W2106345596, https://openalex.org/W2154175667, https://openalex.org/W1832515201, https://openalex.org/W2397857137, https://openalex.org/W2021276494, https://openalex.org/W1973599573, https://openalex.org/W2085125115, https://openalex.org/W2053362087, https://openalex.org/W1500761685, https://openalex.org/W2010527616, https://openalex.org/W2033027791, https://openalex.org/W1542382722, https://openalex.org/W2019307453, https://openalex.org/W4298227433, https://openalex.org/W2124183676, https://openalex.org/W2201666892, https://openalex.org/W2080911030, https://openalex.org/W2181513051, https://openalex.org/W2124885906, https://openalex.org/W2002501531, https://openalex.org/W4210551624, https://openalex.org/W2114607430, https://openalex.org/W2164651000, https://openalex.org/W2122965351, https://openalex.org/W2013784340, https://openalex.org/W1607225066, https://openalex.org/W2080975816, https://openalex.org/W6677934245, https://openalex.org/W4250872889, https://openalex.org/W3141585064, https://openalex.org/W2027471022, https://openalex.org/W2088492763, https://openalex.org/W2006453614, https://openalex.org/W2026641099, https://openalex.org/W2144007657, https://openalex.org/W4300840296, https://openalex.org/W2150412388, https://openalex.org/W2119336214, https://openalex.org/W1507124880, https://openalex.org/W1987667503, https://openalex.org/W2336770924, https://openalex.org/W2004283834, https://openalex.org/W987035227, https://openalex.org/W2912956481, https://openalex.org/W2990885002, https://openalex.org/W3098534137, https://openalex.org/W4285719527, https://openalex.org/W2206295654, https://openalex.org/W3104935792, https://openalex.org/W3102581918, https://openalex.org/W1494099594, https://openalex.org/W2039320535, https://openalex.org/W1549664537, https://openalex.org/W2119422255, https://openalex.org/W1527197079, https://openalex.org/W2099111195, https://openalex.org/W2092422002, https://openalex.org/W2340787257, https://openalex.org/W2478708596 |
| referenced_works_count | 67 |
| abstract_inverted_index.3 | 102 |
| abstract_inverted_index.a | 10, 97, 113, 156, 171, 230, 233 |
| abstract_inverted_index.In | 0, 72, 195 |
| abstract_inverted_index.We | 119 |
| abstract_inverted_index.be | 189 |
| abstract_inverted_index.in | 57, 213, 241 |
| abstract_inverted_index.is | 28, 34, 62 |
| abstract_inverted_index.it | 27 |
| abstract_inverted_index.no | 131 |
| abstract_inverted_index.of | 12, 52, 70, 86, 112, 133, 140, 155, 180, 193, 220, 229, 245 |
| abstract_inverted_index.on | 83, 210 |
| abstract_inverted_index.to | 8, 23, 47, 80, 96, 148, 188 |
| abstract_inverted_index.we | 75, 197, 223 |
| abstract_inverted_index.$n$ | 37 |
| abstract_inverted_index.MPC | 33 |
| abstract_inverted_index.Our | 150, 183 |
| abstract_inverted_index.all | 105, 211 |
| abstract_inverted_index.and | 41, 44, 67, 88, 130, 135, 142, 168, 178, 216, 248 |
| abstract_inverted_index.are | 107, 186 |
| abstract_inverted_index.for | 91, 123, 160, 175 |
| abstract_inverted_index.gap | 164 |
| abstract_inverted_index.had | 253 |
| abstract_inverted_index.new | 172 |
| abstract_inverted_index.the | 58, 65, 84, 116, 125, 138, 153, 163, 207, 214, 225, 238, 242 |
| abstract_inverted_index.use | 154, 218 |
| abstract_inverted_index.who | 252 |
| abstract_inverted_index.Naor | 249 |
| abstract_inverted_index.also | 217 |
| abstract_inverted_index.both | 124 |
| abstract_inverted_index.case | 127 |
| abstract_inverted_index.cost | 236 |
| abstract_inverted_index.data | 15, 22, 157 |
| abstract_inverted_index.goes | 147 |
| abstract_inverted_index.have | 45 |
| abstract_inverted_index.less | 53 |
| abstract_inverted_index.show | 198 |
| abstract_inverted_index.than | 54, 237 |
| abstract_inverted_index.this | 73 |
| abstract_inverted_index.$n/2$ | 55 |
| abstract_inverted_index.Also, | 222 |
| abstract_inverted_index.While | 26 |
| abstract_inverted_index.about | 20, 64 |
| abstract_inverted_index.among | 36 |
| abstract_inverted_index.error | 141 |
| abstract_inverted_index.first | 226 |
| abstract_inverted_index.i.e., | 204 |
| abstract_inverted_index.input | 239 |
| abstract_inverted_index.known | 29, 63 |
| abstract_inverted_index.links | 43, 212 |
| abstract_inverted_index.lower | 121, 184 |
| abstract_inverted_index.model | 244 |
| abstract_inverted_index.other | 24 |
| abstract_inverted_index.shown | 187, 254 |
| abstract_inverted_index.their | 13, 21 |
| abstract_inverted_index.tight | 190 |
| abstract_inverted_index.users | 38, 56, 103 |
| abstract_inverted_index.which | 205 |
| abstract_inverted_index.work, | 74 |
| abstract_inverted_index.(MPC), | 4 |
| abstract_inverted_index.(i.e., | 128, 162 |
| abstract_inverted_index.(where | 137 |
| abstract_inverted_index.3-user | 176 |
| abstract_inverted_index.[STOC, | 250 |
| abstract_inverted_index.access | 46 |
| abstract_inverted_index.amount | 85 |
| abstract_inverted_index.bounds | 122, 185 |
| abstract_inverted_index.derive | 120 |
| abstract_inverted_index.employ | 76 |
| abstract_inverted_index.higher | 234 |
| abstract_inverted_index.incurs | 232 |
| abstract_inverted_index.length | 240 |
| abstract_inverted_index.model, | 60 |
| abstract_inverted_index.model. | 118 |
| abstract_inverted_index.mutual | 166 |
| abstract_inverted_index.obtain | 81, 224 |
| abstract_inverted_index.secure | 1, 32, 92 |
| abstract_inverted_index.single | 114 |
| abstract_inverted_index.users. | 25 |
| abstract_inverted_index.vanish | 145 |
| abstract_inverted_index."Feige, | 246 |
| abstract_inverted_index.1994]", | 251 |
| abstract_inverted_index.Kilian, | 247 |
| abstract_inverted_index.achieve | 206 |
| abstract_inverted_index.against | 50, 110 |
| abstract_inverted_index.between | 165 |
| abstract_inverted_index.compute | 9 |
| abstract_inverted_index.example | 228 |
| abstract_inverted_index.include | 152 |
| abstract_inverted_index.leakage | 132, 144 |
| abstract_inverted_index.private | 14, 48 |
| abstract_inverted_index.setting | 100 |
| abstract_inverted_index.without | 16 |
| abstract_inverted_index.MPC.\nWe | 93 |
| abstract_inverted_index.concrete | 98, 199 |
| abstract_inverted_index.exist.\n | 257 |
| abstract_inverted_index.explicit | 227 |
| abstract_inverted_index.function | 11 |
| abstract_inverted_index.mutually | 5 |
| abstract_inverted_index.network, | 215 |
| abstract_inverted_index.possible | 35 |
| abstract_inverted_index.required | 90 |
| abstract_inverted_index.restrict | 94 |
| abstract_inverted_index.securely | 108 |
| abstract_inverted_index.user\nin | 115 |
| abstract_inverted_index.functions | 106, 192, 200, 256 |
| abstract_inverted_index.interest. | 194 |
| abstract_inverted_index.involving | 101 |
| abstract_inverted_index.noiseless | 42 |
| abstract_inverted_index.ourselves | 95 |
| abstract_inverted_index.revealing | 17 |
| abstract_inverted_index.the\nidea | 179 |
| abstract_inverted_index.theoretic | 78 |
| abstract_inverted_index.(connected | 39 |
| abstract_inverted_index.by\nsecure | 40 |
| abstract_inverted_index.complexity | 69 |
| abstract_inverted_index.computable | 109 |
| abstract_inverted_index.corruption | 111 |
| abstract_inverted_index.inequality | 159, 174 |
| abstract_inverted_index.multiparty | 2 |
| abstract_inverted_index.processing | 158 |
| abstract_inverted_index.protocols, | 177, 203 |
| abstract_inverted_index.randomness | 68, 89 |
| abstract_inverted_index.switching. | 182 |
| abstract_inverted_index.techniques | 79, 151 |
| abstract_inverted_index.that\nsuch | 255 |
| abstract_inverted_index.zero-error | 129 |
| abstract_inverted_index.computation | 3 |
| abstract_inverted_index.distrusting | 6 |
| abstract_inverted_index.information | 19, 77, 143, 167, 173 |
| abstract_inverted_index.interactive | 99 |
| abstract_inverted_index.particular, | 196 |
| abstract_inverted_index.probability | 139 |
| abstract_inverted_index.randomness) | 49 |
| abstract_inverted_index.randomness. | 221 |
| abstract_inverted_index.which\nhave | 201 |
| abstract_inverted_index.distribution | 181 |
| abstract_inverted_index.for\nvarious | 191 |
| abstract_inverted_index.information) | 134 |
| abstract_inverted_index.under\nwhich | 104 |
| abstract_inverted_index.$\\infty$).\n | 149 |
| abstract_inverted_index.communication | 66, 87, 235 |
| abstract_inverted_index.information), | 170 |
| abstract_inverted_index.lower\nbounds | 82 |
| abstract_inverted_index.theoretically | 31 |
| abstract_inverted_index.function\nthat | 231 |
| abstract_inverted_index.simultaneously | 209 |
| abstract_inverted_index.the\ncollusion | 51 |
| abstract_inverted_index.any\nadditional | 18 |
| abstract_inverted_index.minimum\namount | 219 |
| abstract_inverted_index.as\nblock-length | 146 |
| abstract_inverted_index.relatively\nless | 61 |
| abstract_inverted_index.perfect\nsecurity | 126 |
| abstract_inverted_index.that\ninformation | 30 |
| abstract_inverted_index.honest-but-curious | 59, 117 |
| abstract_inverted_index.users\ncollaborate | 7 |
| abstract_inverted_index.secure\ncomputation | 243 |
| abstract_inverted_index.asymptotic\nsecurity | 136 |
| abstract_inverted_index."communication-ideal" | 202 |
| abstract_inverted_index.residual\ninformation | 161 |
| abstract_inverted_index.minimum\ncommunication | 208 |
| abstract_inverted_index.secure\ncomputation.\n | 71 |
| abstract_inverted_index.G\\'acs-K\\"orner\ncommon | 169 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.8199999928474426 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.9457554 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |