Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484584
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious Linear Group Actions and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…In the second application, we show that we can construct a more efficient protocol for B2A conversion than an existing one by applying the main theorem to the secure table lookup protocol, achieving approximately eight times shorter CR size. Here, B2A conversion is a function which maps boolean share (x 0 , x 1 ) to arithmetic share (y 0 , y 1 ) such that y 0 + y Using CR, the computation cost and the communication complexity become small, and therefore many recent works (e.g., [4], [5], [7], [11], [12]) adopted the CR model. From a theoretical viewpoint in CR model, it is a major open problem whether it is possible to make the communication complexity sublinear in the circuit size.…”
Section: Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the second application, we show that we can construct a more efficient protocol for B2A conversion than an existing one by applying the main theorem to the secure table lookup protocol, achieving approximately eight times shorter CR size. Here, B2A conversion is a function which maps boolean share (x 0 , x 1 ) to arithmetic share (y 0 , y 1 ) such that y 0 + y Using CR, the computation cost and the communication complexity become small, and therefore many recent works (e.g., [4], [5], [7], [11], [12]) adopted the CR model. From a theoretical viewpoint in CR model, it is a major open problem whether it is possible to make the communication complexity sublinear in the circuit size.…”
Section: Applicationsmentioning
confidence: 99%
“…In the online protocol, the parties securely compute a function with their inputs and the CR distributed by the offline protocol. Some papers (e.g., [4], [5], [7]) assume that a trusted dealer runs the offline protocol, i.e., a trusted dealer generates and distributes CR.…”
Section: Introductionmentioning
confidence: 99%
“…For arithmetic-input unit vectorization, our protocol is the same as the one-time truth table protocol from [12] when using one-hot vectors. For boolean inputs, we propose a new protocol, which can be considered as a variant of the XOR-permutation action proposed in [6]. These schemes require preprocessing; that is, some appropriate correlated randomness is required and is generated in the offline phase.…”
Section: Core Protocol: Unit Vectorizationmentioning
confidence: 99%
“…IfThen, Pow and Mult Protocols We refer to existing protocols for computing IfThen, Pow and Mult. In this paper, we employ the protocols Π Mux , Π Polyval , Π Mult proposed in [6]. Each of the protocol requires one online communication round.…”
Section: A Secure Equality Testmentioning
confidence: 99%
See 1 more Smart Citation