Technical Program

Paper Detail

Paper IDP.11.4
Paper Title Private Function Computation
Authors Behrooz Tahmasebi, MIT, United States; Mohammad Ali Maddah-Ali, Nokia Bell Labs, United States
Session P.11: Topics in Privacy and Cryptography
Presentation Lecture
Track Cryptography, Security and Privacy
Manuscript  Click here to download the manuscript
Virtual Presentation  Click here to watch in the Virtual Symposium
Abstract In this paper, we study the problem of \textit{private function computation}, where a user wants to compute a function of some inputs, using $N \in \mathbb{N}$ servers, where the function is a private combination/composition of some $K\in \mathbb{N}$ public basic functions $\{f_1,f_2,\ldots,f_K\}$. More precisely, for some inputs $W_m$, $m\in [1: M]$, the user's goal is to calculate $h(W_m) = \sum_{j=1}^J\alpha_j h_j(W_m)$, for some $J\in \mathbb{N}$, some scalers $\alpha_j$, $j \in [1:J]$, and some functions $h_{j}(.)$, $j \in [1:J]$, where each is an arbitrary compositions of the basic functions $\{f_1,f_2,\ldots,f_K\}$. The computation is done through a sequence of queries to $N$ servers. In each query, the user sends an input $W$, which is a (possibly randomized) function of $W_{1:M}$ and the answers to the previous queries, to one of the servers, and asks the server to return $f_k(W)$, for some $k\in [1:K]$. The servers should not obtain any information about the structure of the function $h(.)$, i.e., the way the basic functions are combined to form $h(.)$, from the sequence of queries they received, even if $T$ of them collude, for some $T \in \mathbb{N}$. In this paper, we focus on the cases, where basic functions are linear and can be represented by (possibly large-scale) full-rank matrices, and each basic function may contribute in function $h(.)$ for at most once. We prove that $C$, defined as the supremum of the number of desired computations of the basic functions, normalized by the number of queries, in asymptotic regimes of large $M$, satisfies the following inequality: \begin{align*} \min\Big \{({1-\frac{T}{N}})/({1-\frac{1}{K}}), ({1-\frac{T-1}{N}})\Big\}\le C \le 1. \end{align*} The key idea is that in the proposed scheme, each server is asked to compute a specific order of basic functions, independent from the user's desired function. In addition, some random vectors are added to the inputs of the queries such that the sequence of the queries does not leak any information.

Plan Ahead

IEEE ISIT 2021

2021 IEEE International Symposium on Information Theory

11-16 July 2021 | Melbourne, Victoria, Australia

Visit Website!