Publication: Highly efficient and re-executable private function evaluation with linear complexity
dc.contributor.coauthor | Bingöl, Muhammed Ali | |
dc.contributor.coauthor | Kiraz, Mehmet Sabr | |
dc.contributor.coauthor | Levi, Albert | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.kuauthor | Biçer, Osman | |
dc.contributor.other | Department of Computer Engineering | |
dc.contributor.schoolcollegeinstitute | Graduate School of Sciences and Engineering | |
dc.date.accessioned | 2024-11-09T11:57:20Z | |
dc.date.issued | 2022 | |
dc.description.abstract | Private function evaluation aims to securely compute a function f(x(1), ..., x(n)) without leaking any information other than what is revealed by the output, where f is a private input of one of the parties (say Party(1)) and x(i) is a private input of the ith party Party(i). In this article, we propose a novel and secure two-party private function evaluation (2PFE) scheme based on the DDH assumption. Our scheme introduces a reusability feature that significantly improves the state-of-the-art. Accordingly, our scheme has two variants, one is utilized in the initial execution of the function f, and the other is utilized in its subsequent evaluations. To the best of our knowledge, this is the first and most efficient 2PFE scheme that enjoys a reusablity feature. Our protocols achieve linear communication and computation complexities and a constant number of rounds which is at most three. | |
dc.description.fulltext | YES | |
dc.description.indexedby | WoS | |
dc.description.indexedby | Scopus | |
dc.description.issue | 2 | |
dc.description.openaccess | YES | |
dc.description.publisherscope | International | |
dc.description.sponsoredbyTubitakEu | N/A | |
dc.description.sponsorship | N/A | |
dc.description.version | Author's final manuscript | |
dc.description.volume | 19 | |
dc.format | ||
dc.identifier.doi | 10.1109/TDSC.2020.3009496 | |
dc.identifier.eissn | 1941-0018 | |
dc.identifier.embargo | NO | |
dc.identifier.filenameinventoryno | IR03601 | |
dc.identifier.issn | 1545-5971 | |
dc.identifier.link | https://doi.org/10.1109/TDSC.2020.3009496 | |
dc.identifier.quartile | Q1 | |
dc.identifier.scopus | 2-s2.0-85127610584 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/872 | |
dc.identifier.wos | 767856000009 | |
dc.keywords | Private function evaluation | |
dc.keywords | Secure 2-party computation | |
dc.keywords | Communication complexity | |
dc.keywords | Cryptographic protocol | |
dc.language | English | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.grantno | NA | |
dc.relation.uri | http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/10459 | |
dc.source | IEEE Transactions on Dependable and Secure Computing | |
dc.subject | Computer science | |
dc.subject | Hardware and architecture | |
dc.subject | Computer science, information systems | |
dc.subject | Software engineering | |
dc.title | Highly efficient and re-executable private function evaluation with linear complexity | |
dc.type | Journal Article | |
dspace.entity.type | Publication | |
local.contributor.kuauthor | Biçer, Osman | |
relation.isOrgUnitOfPublication | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isOrgUnitOfPublication.latestForDiscovery | 89352e43-bf09-4ef4-82f6-6f9d0174ebae |
Files
Original bundle
1 - 1 of 1