Skip to main navigation Skip to search Skip to main content

Individual Confidential Computing of Polynomials Over Non-Uniform Information

  • Saar Tarnopolsky
  • , Zirui Deng
  • , Vinayak Ramkumar
  • , Netanel Raviv
  • , Alejandro Cohen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, we address the problem of secure distributed computation in scenarios where user data is not uniformly distributed, extending existing frameworks that assume uniformity, an assumption that is challenging to enforce in data for computation. Motivated by the pervasive reliance on single service providers for data storage and computation, we propose a privacy-preserving scheme that achieves informationtheoretic security guarantees for computing polynomials over non-uniform data distributions. Our framework builds upon the concept of perfect subset privacy and employs linear hashing techniques to transform non-uniform data into approximately uniform distributions, enabling robust and secure computation. We derive leakage bounds and demonstrate that information leakage of any subset of user data to untrusted service providers, i.e., not only to colluding workers but also (and more importantly) to the admin, remains negligible under the proposed scheme.

Original languageEnglish
Title of host publicationISIT 2025 - 2025 IEEE International Symposium on Information Theory, Proceedings
PublisherInstitute of Electrical and Electronics Engineers
ISBN (Electronic)9798331543990
DOIs
StatePublished - 1 Jan 2025
Externally publishedYes
Event2025 IEEE International Symposium on Information Theory, ISIT 2025 - Ann Arbor, United States
Duration: 22 Jun 202527 Jun 2025

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Conference

Conference2025 IEEE International Symposium on Information Theory, ISIT 2025
Country/TerritoryUnited States
CityAnn Arbor
Period22/06/2527/06/25

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Individual Confidential Computing of Polynomials Over Non-Uniform Information'. Together they form a unique fingerprint.

Cite this