Publication:
Highly efficient and re-executable private function evaluation with linear complexity

dc.contributor.coauthorBingöl, Muhammed Ali
dc.contributor.coauthorKiraz, Mehmet Sabr
dc.contributor.coauthorLevi, Albert
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorBiçer, Osman
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.date.accessioned2024-11-09T11:57:20Z
dc.date.issued2022
dc.description.abstractPrivate function evaluation aims to securely compute a function f(x(1), ..., x(n)) without leaking any information other than what is revealed by the output, where f is a private input of one of the parties (say Party(1)) and x(i) is a private input of the ith party Party(i). In this article, we propose a novel and secure two-party private function evaluation (2PFE) scheme based on the DDH assumption. Our scheme introduces a reusability feature that significantly improves the state-of-the-art. Accordingly, our scheme has two variants, one is utilized in the initial execution of the function f, and the other is utilized in its subsequent evaluations. To the best of our knowledge, this is the first and most efficient 2PFE scheme that enjoys a reusablity feature. Our protocols achieve linear communication and computation complexities and a constant number of rounds which is at most three.
dc.description.fulltextYES
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.issue2
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuN/A
dc.description.sponsorshipN/A
dc.description.versionAuthor's final manuscript
dc.description.volume19
dc.formatpdf
dc.identifier.doi10.1109/TDSC.2020.3009496
dc.identifier.eissn1941-0018
dc.identifier.embargoNO
dc.identifier.filenameinventorynoIR03601
dc.identifier.issn1545-5971
dc.identifier.linkhttps://doi.org/10.1109/TDSC.2020.3009496
dc.identifier.quartileQ1
dc.identifier.scopus2-s2.0-85127610584
dc.identifier.urihttps://hdl.handle.net/20.500.14288/872
dc.identifier.wos767856000009
dc.keywordsPrivate function evaluation
dc.keywordsSecure 2-party computation
dc.keywordsCommunication complexity
dc.keywordsCryptographic protocol
dc.languageEnglish
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.grantnoNA
dc.relation.urihttp://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/10459
dc.sourceIEEE Transactions on Dependable and Secure Computing
dc.subjectComputer science
dc.subjectHardware and architecture
dc.subjectComputer science, information systems
dc.subjectSoftware engineering
dc.titleHighly efficient and re-executable private function evaluation with linear complexity
dc.typeJournal Article
dspace.entity.typePublication
local.contributor.kuauthorBiçer, Osman
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
10459.pdf
Size:
653.18 KB
Format:
Adobe Portable Document Format