File Download
Supplementary
-
Citations:
- Appears in Collections:
postgraduate thesis: Private function evaluation : improvements and applications
Title | Private function evaluation : improvements and applications |
---|---|
Authors | |
Issue Date | 2023 |
Publisher | The University of Hong Kong (Pokfulam, Hong Kong) |
Citation | Liu, Y. [劉逸]. (2023). Private function evaluation : improvements and applications. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. |
Abstract | In the problem of two-party private function evaluation (PFE), one party P_A possesses a private function f and (optionally) a private input x_A, while the other party P_B holds a private input x_B. Their goal is to compute f(x_A, x_B) for one or both parties while no other information beyond f(x_A, x_B) is revealed.
Two-party PFE has great potential to solve dilemmas existing in many real-world scenarios. For example, a traditional enterprise holds a private dataset and needs a corresponding algorithm to process it, while an algorithm-driven company possesses the algorithm but treats it as confidential. Another example is for a data trading scenario: A data seller intends to sell an evaluation result derived from her dataset rather than the entire dataset at once, while the data buyer wants to hide his evaluation done on the dataset. A two-party PFE protocol can easily solve these dilemmas.
This thesis revisits the two-party PFE problem. Based on the private function f, two-party PFE problems can be divided into two categories. One considers f as arbitrary functions, while the other considers f as limited classes of functions, \eg low-depth circuits and polynomials. Our major contributions categorized according to the function f are summarized as follows.
1. Considering f as an arbitrary function, we propose the first constant-round actively secure PFE protocol with linear complexity. Based on this result, we further provide the first constant-round publicly verifiable covertly (PVC) secure PFE protocol with linear complexity to gain better efficiency. In our constructions, as a by-product, we design a specific protocol for proving that a list of ElGamal ciphertexts is derived from an extended permutation performed on a given list of elements, which may be of independent interest. In addition, a reusability property is added to our two PFE protocols. Namely, if the same function f is involved in multiple protocol executions between P_A and P_B, the protocol could be executed more efficiently from the second execution. Moreover, we further extend this property to be global, such that it supports multiple executions for the same f in a reusable fashion between P_A and arbitrary parties playing the role of P_B.
2. Aiming at practical data trading scenarios, we introduce a specified concept of PFE, namely blind polynomial evaluation. Here, f is an arbitrary function that can be represented as a multivariate polynomial. We provide a generic construction and an instantiated blind polynomial evaluation protocol via an approach of switching the homomorphic encryption schemes of ciphertexts. Then to improve the efficiency of our protocol, we also introduce an improved zero-knowledge protocol for multi-exponentiation with encrypted bases. Finally, we combine our protocol with the blockchain paradigm to obtain a practical data trading framework. |
Degree | Doctor of Philosophy |
Subject | Data encryption (Computer science) Computer networks - Security measures |
Dept/Program | Computer Science |
Persistent Identifier | http://hdl.handle.net/10722/327638 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Yi | - |
dc.contributor.author | 劉逸 | - |
dc.date.accessioned | 2023-04-04T03:02:48Z | - |
dc.date.available | 2023-04-04T03:02:48Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Liu, Y. [劉逸]. (2023). Private function evaluation : improvements and applications. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. | - |
dc.identifier.uri | http://hdl.handle.net/10722/327638 | - |
dc.description.abstract | In the problem of two-party private function evaluation (PFE), one party P_A possesses a private function f and (optionally) a private input x_A, while the other party P_B holds a private input x_B. Their goal is to compute f(x_A, x_B) for one or both parties while no other information beyond f(x_A, x_B) is revealed. Two-party PFE has great potential to solve dilemmas existing in many real-world scenarios. For example, a traditional enterprise holds a private dataset and needs a corresponding algorithm to process it, while an algorithm-driven company possesses the algorithm but treats it as confidential. Another example is for a data trading scenario: A data seller intends to sell an evaluation result derived from her dataset rather than the entire dataset at once, while the data buyer wants to hide his evaluation done on the dataset. A two-party PFE protocol can easily solve these dilemmas. This thesis revisits the two-party PFE problem. Based on the private function f, two-party PFE problems can be divided into two categories. One considers f as arbitrary functions, while the other considers f as limited classes of functions, \eg low-depth circuits and polynomials. Our major contributions categorized according to the function f are summarized as follows. 1. Considering f as an arbitrary function, we propose the first constant-round actively secure PFE protocol with linear complexity. Based on this result, we further provide the first constant-round publicly verifiable covertly (PVC) secure PFE protocol with linear complexity to gain better efficiency. In our constructions, as a by-product, we design a specific protocol for proving that a list of ElGamal ciphertexts is derived from an extended permutation performed on a given list of elements, which may be of independent interest. In addition, a reusability property is added to our two PFE protocols. Namely, if the same function f is involved in multiple protocol executions between P_A and P_B, the protocol could be executed more efficiently from the second execution. Moreover, we further extend this property to be global, such that it supports multiple executions for the same f in a reusable fashion between P_A and arbitrary parties playing the role of P_B. 2. Aiming at practical data trading scenarios, we introduce a specified concept of PFE, namely blind polynomial evaluation. Here, f is an arbitrary function that can be represented as a multivariate polynomial. We provide a generic construction and an instantiated blind polynomial evaluation protocol via an approach of switching the homomorphic encryption schemes of ciphertexts. Then to improve the efficiency of our protocol, we also introduce an improved zero-knowledge protocol for multi-exponentiation with encrypted bases. Finally, we combine our protocol with the blockchain paradigm to obtain a practical data trading framework. | - |
dc.language | eng | - |
dc.publisher | The University of Hong Kong (Pokfulam, Hong Kong) | - |
dc.relation.ispartof | HKU Theses Online (HKUTO) | - |
dc.rights | The author retains all proprietary rights, (such as patent rights) and the right to use in future works. | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.subject.lcsh | Data encryption (Computer science) | - |
dc.subject.lcsh | Computer networks - Security measures | - |
dc.title | Private function evaluation : improvements and applications | - |
dc.type | PG_Thesis | - |
dc.description.thesisname | Doctor of Philosophy | - |
dc.description.thesislevel | Doctoral | - |
dc.description.thesisdiscipline | Computer Science | - |
dc.description.nature | published_or_final_version | - |
dc.date.hkucongregation | 2023 | - |
dc.date.hkucongregation | 2023 | - |
dc.identifier.mmsid | 991044657078303414 | - |