2013
DOI: 10.1002/sec.851
|View full text |Cite
|
Sign up to set email alerts
|

For your phone only: custom protocols for efficient secure function evaluation on mobile devices

Abstract: Mobile applications increasingly require users to surrender private information, such as GPS location or social networking data. To facilitate user privacy when using these applications, secure function evaluation (SFE) could be used to obliviously compute functions over encrypted inputs. The dominant construction for desktop applications is the Yao garbled circuit, but this technique requires significant processing power and network overhead, making it extremely expensive on resource‐constrained mobile device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 26 publications
(48 reference statements)
0
18
0
Order By: Relevance
“…Implementations of PSI protocols on smartphones such as [4,10,33] can be found in the literature, but they either do not achieve linear complexity or do not consider the offline/online setting, and hence are not suited for our scenario.…”
Section: Related Work On Psimentioning
confidence: 99%
“…Implementations of PSI protocols on smartphones such as [4,10,33] can be found in the literature, but they either do not achieve linear complexity or do not consider the offline/online setting, and hence are not suited for our scenario.…”
Section: Related Work On Psimentioning
confidence: 99%
“…Carter et al recently proposed this for mobile devices [7,8,9]. We build on this model, but further allow circuit generation to be also outsourced, such that the second party can be also a computationally weak device.…”
Section: Outsourcingmentioning
confidence: 99%
“…This is envisioned in [7,8], but only achieved for one computationally weak device -the one that does not generate the garbled circuit. They do this using any garbling scheme as defined by Bellare et al by sharing the encoding and decoding keys e, d. The cloud would then perform the evaluation function Ev.…”
Section: Multi-user Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…Nikolaenko et al [51,50] use similar non-collusion assumption where they trust the third party (garbled circuit generator) not to collude with the garbled circuit evaluator. Protocols for outsourcing multi-party computation [23,22,42,43] use similar non-collusion assumptions to outsource evaluation of the garbled circuits.…”
Section: Preliminariesmentioning
confidence: 99%