Private Function Evaluation for MPC Seminar report for Research Seminar in Cryptography

نویسندگان

  • Pille Pullonen
  • Helger Lipmaa
چکیده

Assume that you invent an algorithm that is able to diagnose different diseases very efficiently based on some general inputs about a person’s health. Clearly, this would be valuable to people and different healthcare institutions would like to apply this in their everyday work. On the other hand, you do not want to hand the algorithm over as it could clearly bring you a lot of money if everyone has to buy this service from you. However, the medical institutions can not just give you the data about their patients. Hence, in this situation you would like to keep your algorithm secret and they also need to keep their inputs secret, but you are both interested in still evaluating this algorithm with the given inputs. This is exactly the problem solved by private function evaluation. Circuit hiding multi-party computation (MPC) or private function evaluation (PFE) is a special additional case of multi-party computation where a private function f needs to be evaluated on private inputs xi to obtain f(x1, . . . , xm). In the concrete setting, we consider the case where one party inputs the function and all parties can provide the inputs. This paper introduces a framework for this kind of computation based on [MS13]. The main body of this overview is divided to two parts. First main part in Sec. 3 introduces the ideas put forth by [MS13] whereas the second part in Sec. 4 writes out the concrete protocols required for secure multi-party boolean circuit evaluation. These are supported by the preliminaries in Sec. 2 and summary of related work in Sec. 5

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-oriented Cryptography 1 Executive Summary Creative Commons By-nc-nd 3.0 Unported License

This report documents the program of the Dagstuhl Seminar 12381 “Privacy-Oriented Cryptography”, which took place at Schloss Dagstuhl in September 16-21, 2012. Being the first Dagstuhl seminar that explicitly aimed to combine cryptography and privacy research communities, it attracted a high number of participants, many of whom were new to Dagstuhl. In total, the seminar was attended by 39 inte...

متن کامل

Cryptography 3 New Techniques for Cryptanalysis of Hash Functions and Improved

From 16.09.2007 to 21.09.2007 the Dagstuhl Seminar 07381 Cryptography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put ...

متن کامل

Symmetric Cryptography Dagstuhl Seminar

From .. to .., the Dagstuhl Seminar 07021 Symmetric Cryptography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put toget...

متن کامل

Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)

This report documents the program and the outcomes of Dagstuhl Seminar 16051 “Modern Cryptography and Security: An Inter-Community Dialogue”. Seminar January 31 to February 5, 2016 – http://www.dagstuhl.de/16051 1998 ACM Subject Classification E.3 Data Encryption, K.6.5 Security and Protection

متن کامل

14021 Symmetric Cryptography

From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015