We consider the problem of computing with encrypted data. Player A wishes to know the value f(x) for some x but lacks the power to compute it. Player Β has the power to compute f and is willing to send f(y) to A if she sends him y, for any y. Informally, an encryption scheme for the problem f is a method by which A, using her inferior resources, can transform the cleartext instance x into an encrypted instance y, obtain f(y) from B, and infer f(x) from f(y) in such a way that Β cannot infer x from y. When such an encryption scheme exists, we say that f is encryptable.
On Hiding Information from an Oracle
M. Abadi,J. Feigenbaum,J. Kilian
Published 1987 in Proceeding Structure in Complexity Theory
ABSTRACT
PUBLICATION RECORD
- Publication year
1987
- Venue
Proceeding Structure in Complexity Theory
- Publication date
1987-01-01
- Fields of study
Mathematics, Computer Science
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-32 of 32 references · Page 1 of 1