Visible to the public Secure Fixed-Point Division for Homomorphically Encrypted Operands

TitleSecure Fixed-Point Division for Homomorphically Encrypted Operands
Publication TypeConference Paper
Year of Publication2018
AuthorsUgwuoke, Chibuike, Erkin, Zekeriya, Lagendijk, Reginald L.
Conference NameProceedings of the 13th International Conference on Availability, Reliability and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6448-5
Keywordscomposability, Encrypted Fixed-point Division, homomorphic encryption, multi-party computation, Privacy-preserving, pubcrawl, Secure Comparison
Abstract

Due to privacy threats associated with computation of outsourced data, processing data on the encrypted domain has become a viable alternative. Secure computation of encrypted data is relevant for analysing datasets in areas (such as genome processing, private data aggregation, cloud computations) that require basic arithmetic operations. Performing division operation over-all encrypted inputs has not been achieved using homomorphic schemes in non-interactive modes. In interactive protocols, the cost of obtaining an encrypted quotient (from encrypted values) is computationally expensive. To the best of our knowledge, existing homomorphic solutions on encrypted division are often relaxed to consider public or private divisor. We acknowledge that there are other techniques such as secret sharing and garbled circuits adopted to compute secure division, but we are interested in homomorphic solutions. We propose an efficient and interactive two-party protocol that computes the fixed-point quotient of two encrypted inputs, using an efficient and secure comparison protocol as a sub-protocol. Our proposal provides a computational advantage, with a linear complexity in the digit precision of the quotient. We provide proof of security in the universally composable framework and complexity analyses. We present experimental results for two cryptosystem implementations in order to compare performance. An efficient prototype of our protocol is implemented using additive homomorphic scheme (Paillier), whereas a non-efficient fully-homomorphic scheme (BGV) version is equally presented as a proof of concept and analyses of our proposal.

URLhttp://dx.doi.org/10.1145/3230833.3233272
DOI10.1145/3230833.3233272
Citation Keyugwuoke_secure_2018