International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) considering a multi-variate polynomial. There are two parties, Alice who has a secret multi-variate polynomial f and Bob who has an input x = (x 1,...,x T ). Thus, Bob wants to compute f(x) without any information leakage: Alice learns nothing about x and Bob learns only what can be inferred from f(x). In [4], the authors proposed a solution for this problem using Oblivious Transfer (OT) protocol only. In this paper, we propose efficient OPE protocols for the multi-variate case based upon additive and multiplicative homomorphic encryption schemes defined on the same domain. Our protocol only reveals the number of monomials
Private set intersection is an important area of research and has been the focus of many works over ...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
We study the problem of Oblivious Polynomial Evaluation (OPE), where one party has a polynomial P & ...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
A secure multiparty computation (MPC) allows several parties to compute a function over their inputs...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
Private set intersection is an important area of research and has been the focus of many works over ...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
We study the problem of Oblivious Polynomial Evaluation (OPE), where one party has a polynomial P & ...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
A secure multiparty computation (MPC) allows several parties to compute a function over their inputs...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
Private set intersection is an important area of research and has been the focus of many works over ...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...
This study concentrates on preserving privacy in a network of agents where each agent seeks to evalu...