95

Oblivious Lookup Tables

Abstract

We consider the following question: given a group-homomorphic public-key encryption EE, a ciphertext c=E(x,pk)c=E(x,pk) hiding a value xx using a key pkpk, and a "suitable" description of a function ff, can we evaluate E(f(x),pk)E(f(x), pk) without decrypting cc? We call this an "oblivious lookup table" and show the existence of such a primitive. To this end, we describe a concrete construction, discuss its security and relations to other cryptographic primitives, and point out directions of future investigations towards generalizations.

View on arXiv
Comments on this paper