2020
DOI: 10.1007/978-3-030-62974-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials

Abstract: Homomorphic secret sharing (HSS) allows multiple input clients to secret-share their data among multiple servers such that each server is able to locally compute a function on its shares to obtain a partial result and all partial results enable the reconstruction of the function's value on the outsourced data by an output client. The existing HSS schemes for high-degree polynomials either require a large number of servers or lack verifiability, which is essential for ensuring the correctness of the outsourced … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…The servers may return wrong results for some economic reasons and internal or external attacks. Furthermore, we adopt the same assumption in related works [4], [6], [7], [16], [20], [21], [31], [33] that the two servers do not collude. It is feasible to consider two non-colluding servers in reality, and the servers can be rented from two different cloud server providers to ensure that the two servers do not collude.…”
Section: System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…The servers may return wrong results for some economic reasons and internal or external attacks. Furthermore, we adopt the same assumption in related works [4], [6], [7], [16], [20], [21], [31], [33] that the two servers do not collude. It is feasible to consider two non-colluding servers in reality, and the servers can be rented from two different cloud server providers to ensure that the two servers do not collude.…”
Section: System Modelmentioning
confidence: 99%
“…In our scheme, two non-communicating servers perform evaluations based on the ciphertext of the data, the classifier in polynomial form and the evaluation key, respectively. Like related works [4], [6], [7], [16], [20], [21], [31], [33], we assume that the two servers are not colluding. This assumption is reasonable because the two servers do not need to interact at all, and each server performs evaluations independently.…”
Section: ) Privacy Preservationmentioning
confidence: 99%
See 3 more Smart Citations