TY - GEN
T1 - Secure hamming distance based computation and its applications
AU - Jarrous, Ayman
AU - Pinkas, Benny
PY - 2009
Y1 - 2009
N2 - This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure in the sense of full simulatability against malicious adversaries. We show different applications of this family of functions, including a protocol we call m-point-SPIR, which is an efficient variant of symmetric private information retrieval (SPIR). It can be used if the server's database contains N entries, at most N/logN of which have individual values, and the rest are set to some default value. This variant of PIR is unique since it can be based on the existence of OT alone.
AB - This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure in the sense of full simulatability against malicious adversaries. We show different applications of this family of functions, including a protocol we call m-point-SPIR, which is an efficient variant of symmetric private information retrieval (SPIR). It can be used if the server's database contains N entries, at most N/logN of which have individual values, and the rest are set to some default value. This variant of PIR is unique since it can be based on the existence of OT alone.
UR - http://www.scopus.com/inward/record.url?scp=68849096248&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-01957-9_7
DO - 10.1007/978-3-642-01957-9_7
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:68849096248
SN - 3642019560
SN - 9783642019562
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 107
EP - 124
BT - Applied Cryptography and Network Security - 7th International Conference, ACNS 2009, Proceedings
T2 - 7th International Conference on Applied Cryptography and Network Security, ACNS 2009
Y2 - 2 June 2009 through 5 June 2009
ER -