We present two secure two party computation (STPC) protocols for piecewise function approximation on private data. The protocols rely on a piecewise approximation of the to-be-computed function easing the implementation in an STPC setting. The first protocol relies entirely on garbled circuits (GCs), while the second one exploits a hybrid construction where GC and homomorphic encryption are used together. In addition to piecewise constant and linear approximation, polynomial interpolation is also considered. From a communication complexity perspective, the full-GC implementation is preferable when the input and output variables can be represented with a small number of bits, while the hybrid solution is preferable otherwise. With regard to computational complexity, the full-GC solution is generally more convenient.

Lazzeretti, R., Pignata, T., Barni, M. (2016). Piecewise function approximation with private data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11(3), 642-657 [10.1109/TIFS.2015.2503268].

Piecewise function approximation with private data

Barni, Mauro
2016-01-01

Abstract

We present two secure two party computation (STPC) protocols for piecewise function approximation on private data. The protocols rely on a piecewise approximation of the to-be-computed function easing the implementation in an STPC setting. The first protocol relies entirely on garbled circuits (GCs), while the second one exploits a hybrid construction where GC and homomorphic encryption are used together. In addition to piecewise constant and linear approximation, polynomial interpolation is also considered. From a communication complexity perspective, the full-GC implementation is preferable when the input and output variables can be represented with a small number of bits, while the hybrid solution is preferable otherwise. With regard to computational complexity, the full-GC solution is generally more convenient.
2016
Lazzeretti, R., Pignata, T., Barni, M. (2016). Piecewise function approximation with private data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 11(3), 642-657 [10.1109/TIFS.2015.2503268].
File in questo prodotto:
File Dimensione Formato  
07336550.pdf

non disponibili

Descrizione: Articolo principale
Tipologia: PDF editoriale
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 3.31 MB
Formato Adobe PDF
3.31 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/1006811