International audienceDelegating the computation of a polynomial to a server in a verifiable way is challenging. An even more challenging problem is ensuring that this polynomial remains hidden to clients who are able to query such a server. In this paper, we formally define the notion of Private Polynomial Evaluation (PPE). Our main contribution is to design a rigorous security model along with relations between the different security properties. We define polynomial protection (PP), proof unforgeability (UNF), and indistinguishability against chosen function attack (IND-CFA), which formalizes the resistance of a PPE against attackers trying to guess which polynomial is used among two polynomials of their choice. As a second contribution, ...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
This study concentrates on preserving privacy in a network of agents where each agent desires to eva...
Private computation is a generalization of private information retrieval, in which a user is able to...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
This study concentrates on preserving privacy in a network of agents where each agent desires to eva...
Private computation is a generalization of private information retrieval, in which a user is able to...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
This study concentrates on preserving privacy in a network of agents where each agent desires to eva...
Private computation is a generalization of private information retrieval, in which a user is able to...