Hello,
First of all - I am a researcher and fairly new to encryption as I want to use it as a tool for developing protocols in my field of business informatics.
So what I currently do is, that I have some multi-party computation setting, where I have for example two organizations that want to order the data on some feature, e.g., timestamps. Each organizations have their data sorted on their timestamps, i.e., for organization A there is t_1, t_2, \dots, t_n and for organization B is t_1', t_2', \dots, t_m'.
Now, I suggest that they both iterate over their timestamps and A encrypts the current timestamp t_i, sends the encrypted value over to organization B, organization B sends the encrypted boolean of the comparison t_i \leq t_j' back and based on that organization A tells organization B which organization has to progress with their current position.
My question is now, that I’m unsure whether reporting the truth value to organization B might break the TFHE encryption since the Security section of the TFHE documentation describes:
“In particular, it is assumed that the results of decrypted computations are not shared by the secret key owner with any third parties, as such an action can lead to leakage of the secret encryption key. If you are designing an application where decryptions must be shared, you will need to craft custom encryption parameters which are chosen in consideration of the IND-CPA^D security model [1].”
Could someone give me some instruction on what to do? Or some references that I can look up where someone did something similar?
Kind regards,
Christian