Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT

Hamidi, Amirreza, and Ghodosi, Hossein (2022) Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT. In: Lecture Notes in Computer Science (13580) pp. 105-120. From: SciSec 2022: 4th International Conference on Science of Cyber Security, 10-12 August 2022, Matsue, Japan.

[img] PDF (Published Version) - Published Version
Restricted to Repository staff only

View at Publisher Website: https://doi.org/10.1007/978-3-031-17551-...


Abstract

Distributed oblivious polynomial evaluation (DOPE) is a special case of two-party computation where a sender party holds a polynomial f(x) of degree t and a receiver party has an input x2. They communicate with a set of distributed cloud servers to implement a secure computation such that the receiver party obtains f(x2), while the privacy of their inputs is preserved. We present a verifiable and private DOPE protocol using additive homomorphic encryption in the presence of k distributed servers where k does not depend on the degree t. The sender is involved in the offline phase which can be implemented at any time well in advance of the actual online computation phase. Our protocol holds the unconditional security against a malicious sender in the offline phase and a static active adversary corrupting a coalition of at most k- 1 dishonest servers in the online computation phase with negligible probability of error. In addition, it preserves strong privacy conditions for a DOPE system. The communication complexity is determined by the term kt which improves the DOPE approaches of [18] and [5]. Also, the proposed protocol can be extended to a protocol of secure (12) distributed oblivious transfer with the linear communication complexity O(k) where the same setting of security is achieved.

Item ID: 77689
Item Type: Conference Item (Research - E1)
ISBN: 9783031175503
ISSN: 1611-3349
Keywords: Distributed oblivious polynomial evaluation, Distributed oblivious transfer, Homomorphic encryption, Message authentication codes
Copyright Information: © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Date Deposited: 23 Feb 2023 00:28
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 30%
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460402 Data and information privacy @ 40%
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460403 Data security and protection @ 30%
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page