2016
DOI: 10.1515/tmmp-2016-0039
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious Lookup-Tables

Abstract: Evaluating arbitrary functions on encrypted data is one of the holy grails of cryptography, with Fully Homomorphic Encryption (FHE) being probably the most prominent and powerful example. FHE, in its current state is, however, not efficient enough for practical applications. On the other hand, simple homomorphic and somewhat homomorphic approaches are not powerful enough to support arbitrary computations. We propose a new approach towards a practicable system for evaluating functions on encrypted data. Our app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Besides the simple use of putting information into a ciphertext, we may also have practical use for manipulating the ciphertext; of course, contingent upon the knowledge of one (or more) secret keys. The usual practical method is using a (fully) homomorphic encryption; a simple example of which is [31], which also allows to decipher a string into several different plaintexts using different extraction secrets, but does not allow changing any content. Our construction is, however, essentially different from this, since the ability of putting new messages into a ciphertext c also lets us replace messages arbitrarily, provided that we have the respective decryption key.…”
Section: B Encryptionmentioning
confidence: 99%
“…Besides the simple use of putting information into a ciphertext, we may also have practical use for manipulating the ciphertext; of course, contingent upon the knowledge of one (or more) secret keys. The usual practical method is using a (fully) homomorphic encryption; a simple example of which is [31], which also allows to decipher a string into several different plaintexts using different extraction secrets, but does not allow changing any content. Our construction is, however, essentially different from this, since the ability of putting new messages into a ciphertext c also lets us replace messages arbitrarily, provided that we have the respective decryption key.…”
Section: B Encryptionmentioning
confidence: 99%
“…The result of this function is again an encrypted number. A promising approach that can achieve this was presented by Wamser et al [36] in their work on "oblivious lookup-tables".…”
Section: Transfer Functionmentioning
confidence: 99%
“…Hence, the crucial part is to find an approach to extrapolate every vector v i only from one single x i so that the v i are linearly independent from each other. Wamser et al [36] suggest to use a Vandermonde-Matrix as V (Equation 3), because it fulfills these requirements.…”
Section: Oblivious Lookup Tablesmentioning
confidence: 99%