2020
DOI: 10.1109/tdsc.2020.3009496
|View full text |Cite
|
Sign up to set email alerts
|

Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity

Abstract: Private function evaluation aims to securely compute a function f (x1,. .. , xn) without leaking any information other than what is revealed by the output, where f is a private input of one of the parties (say Party 1) and xi is a private input of the i-th party Party i. In this work, we propose a novel and secure two-party private function evaluation (2PFE) scheme based on the DDH assumption. Our scheme introduces a reusability feature that significantly improves the state-of-the-art. Accordingly, our scheme … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…Designs and analyses of novel mechanisms from more diverse areas by using our definitions seem as interesting research. These areas include (but not limited to) secure outsourced computation [51], secure multi-party computation (as in [7] or combination of game theory with known secure protocols [52] for efficiency), more dependable and multi-party versions of private function evaluation [53,54,55], ad hoc network security [11,12], Byzantine fault tolerant systems [37,56] where rational and collaborating processors are involved, blockchain mining (as in [57]), and mining pool games (as in [58,59]). We note that further definitions incorporating ours for more specific or sophisticated use cases, such as modelling conflict of interests, are left as future work as well.…”
Section: Discussionmentioning
confidence: 99%
“…Designs and analyses of novel mechanisms from more diverse areas by using our definitions seem as interesting research. These areas include (but not limited to) secure outsourced computation [51], secure multi-party computation (as in [7] or combination of game theory with known secure protocols [52] for efficiency), more dependable and multi-party versions of private function evaluation [53,54,55], ad hoc network security [11,12], Byzantine fault tolerant systems [37,56] where rational and collaborating processors are involved, blockchain mining (as in [57]), and mining pool games (as in [58,59]). We note that further definitions incorporating ours for more specific or sophisticated use cases, such as modelling conflict of interests, are left as future work as well.…”
Section: Discussionmentioning
confidence: 99%
“…PFE schemes primarily aim to reduce communication cost, round complexity, and improve efficiency of the private computation of a function. Several protocols based on boolean circuits have been proposed, for example [16], [21], [22], [7]. For example, the scheme proposed by Biçer et al [7] is a two-party private function evaluation scheme for boolean circuits, designed to provide security in the semi-honest model.…”
Section: B Related Workmentioning
confidence: 99%
“…Several protocols based on boolean circuits have been proposed, for example [16], [21], [22], [7]. For example, the scheme proposed by Biçer et al [7] is a two-party private function evaluation scheme for boolean circuits, designed to provide security in the semi-honest model. This scheme achieves cost reductions by reusing tokens in the two-party computation stage, thereby eliminating redundant computations and message exchanges during subsequent evaluations of the same function.…”
Section: B Related Workmentioning
confidence: 99%
“…The other class of classical PFE does not rely on universal circuits [2,6,7]. Compared to the previous type of PFE, this type of PFE can achieve higher efficiency by opening the black box of MPC.…”
Section: Related Work 21 Classical Pfementioning
confidence: 99%
“…Compared to the previous type of PFE, this type of PFE can achieve higher efficiency by opening the black box of MPC. We refer the reader to the related work section of [7] for a recent review of this line of PFE. We only add the remark here that these classical PFEs usually involve copying the output of a gate several times as the inputs of further gates.…”
Section: Related Work 21 Classical Pfementioning
confidence: 99%