2020
DOI: 10.48550/arxiv.2011.06191
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions

Abstract: Increasing incidents of security compromises and privacy leakage have raised serious privacy concerns related to cyberspace. Such privacy concerns have been instrumental in the creation of several regulations and acts to restrict the availability and use of privacy-sensitive data. The secure computation problem, initially and formally introduced as secure two-party computation by Andrew Yao in 1986, has been the focus of intense research in academia because of its fundamental role in building many of the exist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…The approach in [22] employs the threshold Paillier cryptosystem to perform multi-party secure aggregation, while HybridAlpha [24] uses a functional encryption cryptosystem to securely aggregate encrypted local models. Existing secure aggregation approaches mainly follow three directions: pairwise masking based approach [3,9], homomorphic encryption based approach [18,22,15] and functional encryption [24,25,27,26,23].…”
Section: Related Workmentioning
confidence: 99%
“…The approach in [22] employs the threshold Paillier cryptosystem to perform multi-party secure aggregation, while HybridAlpha [24] uses a functional encryption cryptosystem to securely aggregate encrypted local models. Existing secure aggregation approaches mainly follow three directions: pairwise masking based approach [3,9], homomorphic encryption based approach [18,22,15] and functional encryption [24,25,27,26,23].…”
Section: Related Workmentioning
confidence: 99%
“…Besides, except for most recently proposed decentralized FE schemes [162,74,163], the classic FE schemes are relied on a trusted third-party authority to provide key services, such as issuing a functional private key associated with specific functionalities. We refer the reader to [164] for a comprehensive study of unique characteristics using emerging and promising functional encryption techniques for various secure computation tasks.…”
Section: Modern Cryptographic Approachesmentioning
confidence: 99%
“…Specifically, even though the crypto community tries to propose various types of homomorphic-or functional-encryption schemes that may focus on providing formal security proof, increasing the security degree, or supporting more generic functionality, there is still a lack of efforts to construct a simple, practical, functionality-specific encryption schemes. We refer the reader to [164] for a comprehensive study of challenges and directions using emerging and promising functional encryption techniques for the secure computation problem. Especially when meeting the edge computing scenario wherein the IoT sensors or mobile devices have limited computation capability; such a demand is emergent in the crypto-based PPML system.…”
Section: Computation Efficiency Improvementmentioning
confidence: 99%