Efficient binary conversion for Paillier encrypted values

99Citations
Citations of this article
67Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer, Damgård, and Nielsen at Eurocrypt 2001. When used with Paillier's cryptosystem, this framework allows for efficient secure evaluation of any arithmetic circuit defined over ℤ N, where N is the RSA modulus of the underlying Paillier cryptosystem. In this paper, we extend the scope of the framework by considering the problem of converting a given Paillier encryption of a value x ε ℤ N into Paillier encryptions of the bits of x. We present solutions for the general case in which x can be any integer in {0, 1,..., N - 1}, and for the restricted case in which x κ) for a security parameter κ. In the latter case, we show how to extract the ℓ least significant bits of x (in encrypted form) in time proportional to ℓ, typically saving a factor of log 2 N/ℓ compared to the general case. Thus, intermediate computations that rely in an essential way on the binary representations of their input values can be handled without enforcing that the entire computation is done bitwise. Typical examples involve the relational operators such as < and =. As a specific scenario we will consider the setting for (approximate) matching of biometric templates, given as bit strings. © International Association for Cryptologic Research 2006.

Cite

CITATION STYLE

APA

Schoenmakers, B., & Tuyls, P. (2006). Efficient binary conversion for Paillier encrypted values. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4004 LNCS, pp. 522–537). Springer Verlag. https://doi.org/10.1007/11761679_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free