In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the exponent and set-intersection, and introduce a new technique for designing efficient secure protocols for these problems (and others). Our starting point is the [BGV11] technique (CRYPTO 2011) for verifiable delegation of polynomial evaluations, using algebraic PRFs. We use this tool, that is useful to achieve verifiability in the outsourced setting, in order to achieve privacy in the standard two-party setting. Our results imply new simple and efficient oblivious polynomial evaluation (OPE) protocols. We further show that our OPE protocols are readily used for secure set-intersection, implying much simpler protocols in the plain model. As a si...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Private set intersection is an important area of research and has been the focus of many works over ...
International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) ...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Private set intersection (PSI) allows participants to securely compute the intersection of their inp...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Private Set Intersection protocols (PSIs) allow parties to compute the intersection of their private...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Private set intersection is an important area of research and has been the focus of many works over ...
International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) ...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Private set intersection (PSI) allows participants to securely compute the intersection of their inp...
In this paper we focus on protocols for private set intersection (PSI), through which two parties, e...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Private Set Intersection protocols (PSIs) allow parties to compute the intersection of their private...
Pseudorandom functions (PRFs) are one of the most fundamental primitives in cryptography. In this wo...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...