On the Efficiency of FHE-Based Private Queries - 2018


Personal query processing is a terribly engaging downside within the fields of each cryptography and databases. During this work, we tend to limit our attention to the efficiency facet of the problem, particularly for basic queries with conditions on various combinations of equality. While not loss of generality, these conditions can be thought to be a Boolean perform, and this Boolean perform will then be evaluated at ciphertexts produced by a totally homomorphic encryption (FHE) theme while not decryption. From the efficiency perspective, the remaining concern is to efficiently test the equality perform while not severely downgrading the performance of FHE-primarily based querying solutions. To this end, we tend to initial analyze the multiplicative depth needed for an equality check algorithm with respect to the plaintext space inhabited by general FHE schemes. The first reason for this approach is that given an equality take a look at algorithm, its efficiency is measured in terms of the multiplicative depth required to construct its arithmetic circuit expression. Indeed, the implemented equality check algorithm dominates the entire performance of FHE-primarily based query solutions, aside from the performance of the underlying FHE theme. Then, we measure the multiplicative depth considering an FHE scheme that takes an extension field as its plaintext house and that supports the depth-free evaluation of Frobenius maps. According to our analysis, when the plaintext space of an FHE scheme is a field of characteristic 2, the equality take a look at algorithm for '-bit messages needs very cheap multiplicative depth dlog'e. Furthermore, we tend to design a group of personal query protocols for conjunctive, disjunctive, and threshold queries primarily based on the equality take a look at algorithm. Similarly, applying the equality test algorithm over F two l , our querying protocols require the minimum depths. More specifically, a multiplicative depth of [log l] + [log (one + ?)] is needed for conjunctive and disjunctive queries, and a depth of [log l] + two[log (one+? )] is needed for threshold conjunctive queries, when their question conditions have p attributes to be compared. Finally, we tend to give a Communication-efficient version of our solutions, though with additional computational costs, when an higher sure d (zero = d = one) on the selectivity of a database is given. Consequently, we cut back the Communication cost from n to approximately [dn] ciphertexts with [log n] additional depth when the database consists of n tuples.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Power Density and Efficiency Enhancement in ICN DC-DC Converters Using Topology Morphing Control ABSTRACT: To regulate output voltage in ICN resonant dc-dc converters, the rectifier of the ICN converter cycles
PROJECT TITLE : A Highly Reliable and High Efficiency Quasi Single Stage Buck Boot Inverter ABSTRACT: A buck-boost power conditioning system is preferred for inverter systems with a wide range of input dc voltage change in
PROJECT TITLE :Distributed-Relay Beamforming for Secrecy Energy Efficiency With Coordinated Eavesdroppers - 2018ABSTRACT:This letter proposes a secure and energy efficient beamforming theme for a distributed amplify-and-forward
PROJECT TITLE :Global Energy Efficiency Optimization for Wireless-Powered Massive MIMO Aided Multiway AF Relay Networks - 2018ABSTRACT:This Project considers a wireless-powered massive multi-input multioutput aided multiway amplify-and-forward
PROJECT TITLE :Spectral and Energy Efficiency Analysis for SLNR Precoding in Massive MIMO Systems With Imperfect CSI - 2018ABSTRACT:We have a tendency to derive tractable bound expressions on achievable spectral potency for a

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry