Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKim, Myungsunen_US
dc.contributor.authorLee, Hyung Taeen_US
dc.contributor.authorLing, Sanen_US
dc.contributor.authorWang, Huaxiongen_US
dc.identifier.citationKim, M., Lee, H. T., Ling, S., & Wang, H. (2018). On the efficiency of FHE-based private queries. IEEE Transactions on Dependable and Secure Computing, 15(2), 357-363. doi:10.1109/TDSC.2016.2568182en_US
dc.description.abstractPrivate query processing is a very attractive problem in the fields of both cryptography and databases. In this work, we restrict our attention to the efficiency aspect of the problem, particularly for basic queries with conditions on various combinations of equality. Without loss of generality, these conditions can be regarded as a Boolean function, and this Boolean function can then be evaluated at ciphertexts produced by a fully homomorphic encryption (FHE) scheme without decryption. From the efficiency perspective, the remaining concern is to efficiently test the equality function without severely downgrading the performance of FHE-based querying solutions. To this end, we first analyze the multiplicative depth required for an equality test algorithm with respect to the plaintext space inhabited by general FHE schemes. The primary reason for this approach is that given an equality test algorithm, its efficiency is measured in terms of the multiplicative depth required to construct its arithmetic circuit expression. Indeed, the implemented equality test algorithm dominates the entire performance of FHE-based query solutions, apart from the performance of the underlying FHE scheme. Then, we measure the multiplicative depth considering an FHE scheme that takes an extension field as its plaintext space and that supports the depth-free evaluation of Frobenius maps. According to our analysis, when the plaintext space of an FHE scheme is a field of characteristic 2, the equality test algorithm for ℓ-bit messages requires the lowest multiplicative depth [log ℓ]. Furthermore, we design a set of private query protocols for conjunctive, disjunctive, and threshold queries based on the equality test algorithm. Similarly, applying the equality test algorithm over F2ℓ, our querying protocols require the minimum depths. More specifically, a multiplicative depth of ⌈log ℓ ⌉ + ⌈log (1+ρ1) ⌉ is required for conjunctive and disjunctive queries, and a depth of ⌈log ℓ ⌉ + 2⌈log (1 + ρ) ⌉ is required for threshold conjunctive queries, when their query conditions have r attributes to be compared. Finally, we provide a communication-efficient version of our solutions, though with additional computational costs, when an upper bound δ (0 ≤ δ ≤ 1) on the selectivity of a database is given. Consequently, we reduce the communication cost from n to approximately ⌈δn⌉ ciphertexts with ⌈log n⌉ additional depth when the database consists of n tuples.en_US
dc.description.sponsorshipMOE (Min. of Education, S’pore)en_US
dc.relation.ispartofIEEE Transactions on Dependable and Secure Computingen_US
dc.rights© 2016 IEEE. All rights reserved.en_US
dc.titleOn the efficiency of FHE-based private queriesen_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Physical and Mathematical Sciencesen_US
dc.subject.keywordsEncrypted Databasesen_US
dc.subject.keywordsHomomorphic Encryptionen_US
item.fulltextNo Fulltext-
Appears in Collections:SPMS Journal Articles

Citations 20

Updated on Mar 16, 2023

Web of ScienceTM
Citations 20

Updated on Mar 20, 2023

Page view(s)

Updated on Mar 21, 2023

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.