2015
DOI: 10.1007/978-3-662-46803-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Function Secret Sharing

Abstract: Motivated by the goal of securely searching and updating distributed data, we introduce and study the notion of function secret sharing (FSS). This new notion is a natural generalization of distributed point functions (DPF), a primitive that was recently introduced by Gilboa and Ishai (Eurocrypt 2014). Given a positive integer p ≥ 2 and a class F of functions f : {0, 1} n → G, where G is an Abelian group, a p-party FSS scheme for F allows one to split each f ∈ F into p succinctly described functions fi : {0, 1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
166
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 197 publications
(167 citation statements)
references
References 47 publications
1
166
0
Order By: Relevance
“…Inputs: w: the query value. Outputs: SB a and NSB b : one sensitive bin and one non-sensitive bin to be retrieved for answering w. Variables: found ← false 1 Function retrieve bins(q(w )) begin 2 for (i, j) ∈ (0, SB − 1), (0, |SB | − 1) do if w = SB i [j] then 3 return SB i and NSB j ; found ← true; break 4 if found = true then 5 for (i, j) ∈ (0, NSB − 1), (0, |NSB | − 1) do 6 if w = NSB i [j] then return NSB i and SB j ; break 7 Retrieve the desired tuples from the cloud by sending encrypted values of the bin SB i (or SB j ) and clear-text values of the bin NSB j (or NSB i ) to the cloud…”
Section: A the Base Casementioning
confidence: 99%
See 2 more Smart Citations
“…Inputs: w: the query value. Outputs: SB a and NSB b : one sensitive bin and one non-sensitive bin to be retrieved for answering w. Variables: found ← false 1 Function retrieve bins(q(w )) begin 2 for (i, j) ∈ (0, SB − 1), (0, |SB | − 1) do if w = SB i [j] then 3 return SB i and NSB j ; found ← true; break 4 if found = true then 5 for (i, j) ∈ (0, NSB − 1), (0, |NSB | − 1) do 6 if w = NSB i [j] then return NSB i and SB j ; break 7 Retrieve the desired tuples from the cloud by sending encrypted values of the bin SB i (or SB j ) and clear-text values of the bin NSB j (or NSB i ) to the cloud…”
Section: A the Base Casementioning
confidence: 99%
“…The last two decades have witnessed the development of secure and privacy-preserving encryption-based [1]- [3] or secret-sharing-based [4]- [7] techniques to realize the database as a service model. Despite significant progress, a cryptographic approach that is both secure (i.e., no leakage of sensitive data to the adversary) and efficient (in terms of time) simultaneously has proved to be very challenging.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Inputs: w: the query value. Outputs: SB a and NSB b : one sensitive bin and one non-sensitive bin to be retrieved for answering w. Variables: found ← false 1 Function retrieve bins(q(w )) begin 2 for (i, j) ∈ (0, SB − 1), (0, |SB | − 1) do if w = SB i [j] then 3 return SB i and NSB j ; found ← true; break end end 4 if found = true then 5 for (i, j) ∈ (0, NSB − 1), (0, |NSB | − 1) do 6 if w = NSB i [j] then return NSB i and SB j ; break end end end 7 Retrieve the desired tuples from the cloud by sending encrypted values of the bin SB i (or SB j ) and clear-text values of the bin NSB j (or NSB i ) to the cloud end Algorithm 2 provides a way to retrieve the bins. Thus, by following Algorithm 2, Table 2 shows that the adversary cannot know the query value w or find a value that is shared between the two sets, when answering to the above-mentioned three queries.…”
Section: Query Value Returned Tuples/adversarial Viewmentioning
confidence: 99%
“…Secret-sharing [41] based techniques. E.g., distributed point function [22], function secret-sharing [7], functional secret-sharing [30], accumulating-automata [18,19], OBSCURE [32], and others [20,33,31]. 3.…”
mentioning
confidence: 99%