Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Comparing information without leaking it

Comparing information without leaking it How can two people determine without revealing anything else to each other whether they possess the same information ” in case they do not? There are surprisingly simple solutions. Comparing Information Without Ronald Fagin, Moni Naor, and Peter Winkler Leaking It Spy vs. Spy is a trademark of E.C. Publications, Inc. ©1996. All rights reserved. Used with permission COMMUNICATIONS OF THE ACM May 1996/Vol. 39, No. 5 C onsider the following problem, which actually occurred in real life; the problem is masked somewhat to protect the participants ™ confidentiality. Bob comes to Ron, a manager in his com- pany, with a complaint about a sensitive matter, asking Ron to keep his identity confidential. A few months later, Moshe (another manager) tells Ron that someone has complained to him, also with a confidentiality request, about the same matter. Ron and Moshe would like to determine whether the same person has complained to each of them, but, if there are two complainers, Ron and Moshe want to give no information to each other about their identities. The protocol typically used in a situation like this is akin to the game œ20 Questions,  but is known as delicate conversational probing. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Communications of the ACM Association for Computing Machinery

Comparing information without leaking it

Loading next page...
 
/lp/association-for-computing-machinery/comparing-information-without-leaking-it-N5Cd33lfho

References (27)

Publisher
Association for Computing Machinery
Copyright
Copyright © 1996 by ACM Inc.
ISSN
0001-0782
DOI
10.1145/229459.229469
Publisher site
See Article on Publisher Site

Abstract

How can two people determine without revealing anything else to each other whether they possess the same information ” in case they do not? There are surprisingly simple solutions. Comparing Information Without Ronald Fagin, Moni Naor, and Peter Winkler Leaking It Spy vs. Spy is a trademark of E.C. Publications, Inc. ©1996. All rights reserved. Used with permission COMMUNICATIONS OF THE ACM May 1996/Vol. 39, No. 5 C onsider the following problem, which actually occurred in real life; the problem is masked somewhat to protect the participants ™ confidentiality. Bob comes to Ron, a manager in his com- pany, with a complaint about a sensitive matter, asking Ron to keep his identity confidential. A few months later, Moshe (another manager) tells Ron that someone has complained to him, also with a confidentiality request, about the same matter. Ron and Moshe would like to determine whether the same person has complained to each of them, but, if there are two complainers, Ron and Moshe want to give no information to each other about their identities. The protocol typically used in a situation like this is akin to the game œ20 Questions,  but is known as delicate conversational probing.

Journal

Communications of the ACMAssociation for Computing Machinery

Published: May 1, 1996

There are no references for this article.