Composable oblivious extended permutations

0Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

An extended permutation is a function f: {1,..., m} → {1,..., n}, used to map an n-element vector a to an m-element vector b by bi = af(i). An oblivious extended permutation allows this mapping to be done while preserving the privacy of a, b and f in a secure multiparty computation protocol. Oblivious extended permutations have several uses, with private function evaluation (PFE) being the theoretically most prominent one. In this paper, we propose a new technique for oblivious evaluation of extended permutations. Our construction is at least as efficient as the existing techniques, conceptually simpler, and has wider applicability. Our technique allows the party providing the description of f to be absent during the computation phase of the protocol. Moreover, that party does not even have to exist — we show how to compute the private representation of f from private data that may itself be computed from the inputs of parties. In other words, our oblivious extended permutations can be freely composed with other privacy-preserving operations in a multiparty computation.

Cite

CITATION STYLE

APA

Laud, P., & Willemson, J. (2015). Composable oblivious extended permutations. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8930, 294–310. https://doi.org/10.1007/978-3-319-17040-4_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free