TY - GEN
T1 - Privacy-preserving multi-party reconciliation using fully homomorphic encryption
AU - Weingarten, Florian
AU - Neugebauer, Georg
AU - Meyer, Ulrike
AU - Wetzel, Susanne
PY - 2013
Y1 - 2013
N2 - Fully homomorphic cryptosystems allow the evaluation of arbitrary Boolean circuits on encrypted inputs and therefore have very important applications in the area of secure multi-party computation. Since every computable function can be expressed as a Boolean circuit, it is theoretically clear how to achieve function evaluation on encrypted inputs. However, the transformation to Boolean circuits is not trivial in practice. In this work, we design such a transformation for certain functions, i.e., we propose algorithms and protocols which make use of fully homomorphic encryption in order to achieve privacy-preserving multi-party reconciliation on ordered sets. Assuming a sufficiently efficient encryption scheme, our solution performs much better than existing approaches in terms of communication overhead and number of homomorphic operations.
AB - Fully homomorphic cryptosystems allow the evaluation of arbitrary Boolean circuits on encrypted inputs and therefore have very important applications in the area of secure multi-party computation. Since every computable function can be expressed as a Boolean circuit, it is theoretically clear how to achieve function evaluation on encrypted inputs. However, the transformation to Boolean circuits is not trivial in practice. In this work, we design such a transformation for certain functions, i.e., we propose algorithms and protocols which make use of fully homomorphic encryption in order to achieve privacy-preserving multi-party reconciliation on ordered sets. Assuming a sufficiently efficient encryption scheme, our solution performs much better than existing approaches in terms of communication overhead and number of homomorphic operations.
KW - cryptographic protocols
KW - fully homomorphic encryption
KW - multi-party reconciliation protocols
KW - privacy
KW - secure group computation
UR - http://www.scopus.com/inward/record.url?scp=84883417903&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883417903&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38631-2_36
DO - 10.1007/978-3-642-38631-2_36
M3 - Conference contribution
AN - SCOPUS:84883417903
SN - 9783642386305
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 493
EP - 506
BT - Network and System Security - 7th International Conference, NSS 2013, Proceedings
T2 - 7th International Conference on Network and System Security, NSS 2013
Y2 - 3 June 2013 through 4 June 2013
ER -