Secure Linear Algebra Using Linearly Recurrent Sequences

Eike Kiltz, Enav Weinreb

Research output: Contribution to journalConference articlepeer-review

Abstract

In this work we present secure two-party protocols for various core problems in linear algebra. Our main building block is a protocol to obliviously decide singularity of an encrypted matrix: Bob holds an n × n matrix M, encrypted with Alice's secret key, and wants to learn whether the matrix is singular or not (and nothing beyond that). We give an interactive protocol between Alice and Bob that solves the above problem with optimal communication complexity while at the same time achieving low round complexity. More precisely, the number of communication rounds in our protocol is polylog(n) and the overall communication is roughly O(n2) (note that the input size is n2). At the core of our protocol we exploit some nice mathematical properties of linearly recurrent sequences and their relation to the characteristic polynomial of the matrix M, following [Wiedemann, 1986]. With our new techniques we are able to improve the round complexity of the communication efficient solution of [Nissim and Weinreb, 2006] from n0.275to polylog(n). Based on our singularity protocol we further extend our result to the problems of securely computing the rank of an encrypted matrix and solving systems of linear equations.

Original languageEnglish
JournalDagstuhl Seminar Proceedings
Volume6111
StatePublished - 1 Jan 2006
EventComplexity of Boolean Functions 2006 - Wadern, Germany
Duration: 12 Mar 200617 Mar 2006

Keywords

  • Linearly Recurrent Sequences
  • Secure Linear Algebra
  • Wiedemann's Algorithm

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Secure Linear Algebra Using Linearly Recurrent Sequences'. Together they form a unique fingerprint.

Cite this