DocumentCode
3238451
Title
Secure function evaluation based on secret sharing and homomorphic encryption
Author
Rane, Shantanu ; Sun, Wei ; Vetro, Anthony
Author_Institution
Mitsubishi Electr. Res. Labs., Cambridge, MA, USA
fYear
2009
fDate
Sept. 30 2009-Oct. 2 2009
Firstpage
827
Lastpage
834
Abstract
Consider the following problem in secure multiparty computation: Alice and Bob possess integers x and y respectively. Charlie is a researcher who would like to compute the value of some function f(x, y). The requirement is that Charlie should not gain any knowledge about x and y other than that which can be obtained from the function itself. Moreover, Alice and Bob do not trust each other and should not gain knowledge about each other´s data. This paper contains initial work on a methodology to enable such secure function evaluation using additive and multiplicative homomorphisms as cryptographic primitives instead of oblivious transfer. It is shown that Charlie can compute the encrypted value of any polynomial in x and y. We present two secure function evaluation protocols for semi-honest participants that can be extended to polynomial functions of an arbitrary number of variables.
Keywords
cryptography; function evaluation; polynomials; security of data; additive homomorphisms; cryptographic primitives; homomorphic encryption; multiplicative homomorphisms; polynomial; secure function evaluation; secure multiparty computation; Circuits; Cryptographic protocols; Cryptography; Data analysis; Data privacy; Hospitals; Information analysis; Laboratories; Polynomials; Sun;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on
Conference_Location
Monticello, IL
Print_ISBN
978-1-4244-5870-7
Type
conf
DOI
10.1109/ALLERTON.2009.5394944
Filename
5394944
Link To Document