Skip to content

tsk & tpk under the PIR problem #443

Answered by ChristianMct
hectorpadin1 asked this question in Q&A
Discussion options

You must be logged in to vote

The case of an internal receiver is already covered by the collective key switching protocol (CKS). In this protocol, all parties except the receiver can generate a share for a target (secret-key) of zero (ie, a decryption share), and aggregate result. From this aggregation and the original ciphertext, the receiver obtains an encryption that can be decrypted from its share of the secret-key.

The receiver public collective key-switching protocol (PCKS) could be any party, including an internal party who could also generate a target public-key for that purpose. But it is sub-optimal because the PCKS is more noisy and more costly than the CKS protocol.

Hope this helps!

Replies: 2 comments 1 reply

Comment options

You must be logged in to vote
0 replies
Answer selected by hectorpadin1
Comment options

You must be logged in to vote
1 reply
@ChristianMct
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants