Invertible Polynomial Representation for Private Set Operations

نویسندگان

  • Jung Hee Cheon
  • Hyunsook Hong
  • Hyung Tae Lee
چکیده

In many private set operations, a set is represented by a polynomial over a ring Zσ for a composite integer σ, where Zσ is the message space of some additive homomorphic encryption. While it is useful for implementing set operations with polynomial additions and multiplications, a polynomial representation has a limitation due to the hardness of polynomial factorizations over Zσ. That is, it is hard to recover a corresponding set from a resulting polynomial over Zσ if σ is not a prime. In this paper, we propose a new representation of a set by a polynomial over Zσ, in which σ is a composite integer with known factorization but a corresponding set can be efficiently recovered from a polynomial except negligible probability. Note that Zσ[x] is not a unique factorization domain, so a polynomial may be written as a product of linear factors in several ways. To exclude irrelevant linear factors, we introduce a special encoding function which supports early abort strategy. As a result, our representation can be efficiently inverted by computing all the linear factors of a polynomial in Zσ[x] whose root locates in the image of encoding function. When we consider group decryption as in most private set operation protocols, inverting polynomial representations should be done without a single party possessing a factorization of σ. This is very hard for Paillier’s encryption whose message space is ZN with unknown factorization of N . Instead, we detour this problem by using Naccache-Stern encryption with message space Zσ where σ is a smooth integer with public factorization. As an application of our representation, we obtain a constant round privacy-preserving set union protocol. Our construction improves the complexity than the previous without honest majority assumption. It can be also used for constant round multi-set union protocol and private set intersection protocol even when decryptors do not possess a superset of the resulting set.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Privacy-Preserving Element Reduction of Multiset

Among private set operations, the privacy preserving element reduction of a multiset can be an important tool for privacy enhancing technology as itself or in the combination with other private set operations. Recently, a protocol, over-threshold-set-union-protocol, for a privacy preserving element reduction method of a multiset was proposed by Kissner and Song in Crypto 2005. In this paper, we...

متن کامل

Analysis of Privacy-preserving Element Reduction of a Multiset

The element reduction of a multiset S is to reduce the number of repetitions of an element in S by a predetermined number. Privacypreserving element reduction of a multiset is an important tool in private computation over multisets. It can be used by itself or by combination with other private set operations. Recently, an efficient privacy-preserving element reduction method was proposed by Kis...

متن کامل

Every Convex Free Basic Semi-algebraic Set Has an Lmi Representation

The (matricial) solution set of a Linear Matrix Inequality (LMI) is a convex non-commutative basic open semi-algebraic set (defined below). The main theorem of this paper is a converse, a result which has implications for both semidefinite programming and systems engineering. A non-commutative basic open semi-algebraic set is defined in terms of a non-commutative `×`-matrix polynomial p(x1 · · ...

متن کامل

Invertible quantum operations and perfect encryption of quantum states

In this note, we characterize the form of an invertible quantum operation, i.e., a completely positive trace preserving linear transformation (a CPTP map) whose inverse is also a CPTP map. The precise form of such maps becomes important in contexts such as self-testing and encryption. We show that these maps correspond to applying a unitary transformation to the state along with an ancilla init...

متن کامل

Canonical representation for approximating solution of fuzzy polynomial equations

In this paper, the concept of canonical representation is proposed to find fuzzy roots of fuzzy polynomial equations. We transform fuzzy polynomial equations to system of crisp polynomial equations, this transformation is perform by using canonical representation based on three parameters Value, Ambiguity and Fuzziness. 

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012