Invertible Polynomial Representation for Private Set Operations
نویسندگان
چکیده
In many private set operations, a set is represented by a polynomial over a ring Zσ for a composite integer σ, where Zσ is the message space of some additive homomorphic encryption. While it is useful for implementing set operations with polynomial additions and multiplications, a polynomial representation has a limitation due to the hardness of polynomial factorizations over Zσ. That is, it is hard to recover a corresponding set from a resulting polynomial over Zσ if σ is not a prime. In this paper, we propose a new representation of a set by a polynomial over Zσ, in which σ is a composite integer with known factorization but a corresponding set can be efficiently recovered from a polynomial except negligible probability. Note that Zσ[x] is not a unique factorization domain, so a polynomial may be written as a product of linear factors in several ways. To exclude irrelevant linear factors, we introduce a special encoding function which supports early abort strategy. As a result, our representation can be efficiently inverted by computing all the linear factors of a polynomial in Zσ[x] whose root locates in the image of encoding function. When we consider group decryption as in most private set operation protocols, inverting polynomial representations should be done without a single party possessing a factorization of σ. This is very hard for Paillier’s encryption whose message space is ZN with unknown factorization of N . Instead, we detour this problem by using Naccache-Stern encryption with message space Zσ where σ is a smooth integer with public factorization. As an application of our representation, we obtain a constant round privacy-preserving set union protocol. Our construction improves the complexity than the previous without honest majority assumption. It can be also used for constant round multi-set union protocol and private set intersection protocol even when decryptors do not possess a superset of the resulting set.
منابع مشابه
Analysis of Privacy-Preserving Element Reduction of Multiset
Among private set operations, the privacy preserving element reduction of a multiset can be an important tool for privacy enhancing technology as itself or in the combination with other private set operations. Recently, a protocol, over-threshold-set-union-protocol, for a privacy preserving element reduction method of a multiset was proposed by Kissner and Song in Crypto 2005. In this paper, we...
متن کاملAnalysis of Privacy-preserving Element Reduction of a Multiset
The element reduction of a multiset S is to reduce the number of repetitions of an element in S by a predetermined number. Privacypreserving element reduction of a multiset is an important tool in private computation over multisets. It can be used by itself or by combination with other private set operations. Recently, an efficient privacy-preserving element reduction method was proposed by Kis...
متن کاملEvery Convex Free Basic Semi-algebraic Set Has an Lmi Representation
The (matricial) solution set of a Linear Matrix Inequality (LMI) is a convex non-commutative basic open semi-algebraic set (defined below). The main theorem of this paper is a converse, a result which has implications for both semidefinite programming and systems engineering. A non-commutative basic open semi-algebraic set is defined in terms of a non-commutative `×`-matrix polynomial p(x1 · · ...
متن کاملInvertible quantum operations and perfect encryption of quantum states
In this note, we characterize the form of an invertible quantum operation, i.e., a completely positive trace preserving linear transformation (a CPTP map) whose inverse is also a CPTP map. The precise form of such maps becomes important in contexts such as self-testing and encryption. We show that these maps correspond to applying a unitary transformation to the state along with an ancilla init...
متن کاملCanonical representation for approximating solution of fuzzy polynomial equations
In this paper, the concept of canonical representation is proposed to find fuzzy roots of fuzzy polynomial equations. We transform fuzzy polynomial equations to system of crisp polynomial equations, this transformation is perform by using canonical representation based on three parameters Value, Ambiguity and Fuzziness.
متن کامل