Proceedings of the 10th Workshop on Encrypted Computing &Amp; Applied Homomorphic Cryptography 2022
DOI: 10.1145/3560827.3563377
|View full text |Cite
|
Sign up to set email alerts
|

Probonite

Abstract: Graphs are a widely used data structure for collecting and analyzing relational data. However, when the graph structure is distributed across several parties, its analysis is particularly challenging. In particular, due to the sensitivity of the data each party might want to keep their partial knowledge of the graph private, while still willing to collaborate with the other parties for tasks of mutual benefit, such as data curation or the removal of poisoned data. To address this challenge, we propose Crypto'G… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…An important element of our construction, which may be of independent interest, is what we call Blind Matrix Access (BMA). It is the extension of Blind Array Access (BAA) introduced in [3] which enables a server to obliviously access a one-dimensional encrypted array represented as a RLWE ciphertext. The access consists in performing a PBS on the array with the input index to be accessed.…”
Section: Accessing An Encrypted Matrix Blindlymentioning
confidence: 99%
See 1 more Smart Citation
“…An important element of our construction, which may be of independent interest, is what we call Blind Matrix Access (BMA). It is the extension of Blind Array Access (BAA) introduced in [3] which enables a server to obliviously access a one-dimensional encrypted array represented as a RLWE ciphertext. The access consists in performing a PBS on the array with the input index to be accessed.…”
Section: Accessing An Encrypted Matrix Blindlymentioning
confidence: 99%
“…This counter, by the end of Algorithm 2, will be utilized to restore the head to its first position. The initial phase of each step involves blindly reading the cell under the head, employing the Blind Array Access algorithm outlined in [3]. Subsequently, the resulting ciphertext, combined with the current state, is utilized to access the three matrices: Iw, Im, and Is.…”
Section: B Description Of a Stepmentioning
confidence: 99%