Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196503
|View full text |Cite
|
Sign up to set email alerts
|

Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…De Cock et al [20] follow the same idea as some previous schemes by first running comparisons. In contrast to all other protocols (ours included), which are secure in the computational setting, they operate in the information theoretic model using secret sharing based SMC and commodity-based cryptography [4] to reduce the [41] propose a non-interactive comparison protocol called XCMP using BGV homomorphic scheme [8]. They then implement the private decision tree protocol of Tai et al [48] using XCMP which is output expressive (i.e., it preserves additive homomorphism).…”
Section: Related Workmentioning
confidence: 99%
“…De Cock et al [20] follow the same idea as some previous schemes by first running comparisons. In contrast to all other protocols (ours included), which are secure in the computational setting, they operate in the information theoretic model using secret sharing based SMC and commodity-based cryptography [4] to reduce the [41] propose a non-interactive comparison protocol called XCMP using BGV homomorphic scheme [8]. They then implement the private decision tree protocol of Tai et al [48] using XCMP which is output expressive (i.e., it preserves additive homomorphism).…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography Research Group at Microsoft Research developed Simple Encrypted Arithmetic Library (SEAL) [1], providing a simple and practical software infrastructure using the FV homomorphic encryption scheme for homomorphic applications [5]. SEAL already gained recognition in the literature [11], [12], [13]. In our proof of concept framework, we utilize our NTT-based polynomial multiplier design to accelerate SEAL software by offloading large degree polynomial multiplication operations to the hardware accelerator implemented on FPGA board.…”
Section: Introductionmentioning
confidence: 99%
“…The GC contains 3t AND-gates for comparison and multiplexing (for selecting the next node to traverse after comparison) 4. Tueno et al[42] suggested handling sparse trees by OAI over fewer (than 2 ) nodes; however, this leaks the tree structure, so this paper treats it as 2 .5Table Iomits "non-interactive" (i.e., round-optimal) protocols[33],[41], which require public-key somewhat HE and heavier computation. For example, Lu et al[33] transform the 4-round protocol of Tai et al[40] into 2-round 6.…”
mentioning
confidence: 99%
“…Tueno et al[42] suggested handling sparse trees by OAI over fewer (than 2 ) nodes; however, this leaks the tree structure, so this paper treats it as 2 .5Table Iomits "non-interactive" (i.e., round-optimal) protocols[33],[41], which require public-key somewhat HE and heavier computation. For example, Lu et al[33] transform the 4-round protocol of Tai et al[40] into 2-round 6. This computation model was also used for securely computing/outsourcing other tasks (e.g., private set intersection[13] and linear mean classifiers[44]).…”
mentioning
confidence: 99%