pith. machine review for the scientific record. sign in

arxiv: 2603.26407 · v3 · submitted 2026-03-27 · 💻 cs.CR

Recognition: no theorem link

Hidden Elo: Private Matchmaking through Encrypted Rating Systems

Authors on Pith no claims yet

Pith reviewed 2026-05-14 22:37 UTC · model grok-4.3

classification 💻 cs.CR
keywords private matchmakingfully homomorphic encryptionElo ratingprivacy-preserving computationencrypted rating updatessecure matchmaking protocol
0
0 comments X

The pith

H-Elo updates player ratings on encrypted values so matchmaking proceeds without exposing ratings to the server.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper presents H-Elo, a fully homomorphic encryption construction that supports the arithmetic steps of traditional rating systems such as Elo. After a match the server can compute an updated rating for each participant while the actual rating numbers stay hidden in ciphertexts. Experiments on chess match data show that the resulting ratings stay close enough to plaintext Elo outputs to produce comparable pairing quality. The design is shown to resist extraction of rating information by a capable adversary who controls the server.

Core claim

H-Elo supplies an encryption scheme whose ciphertexts support the addition and multiplication operations needed for Elo rating formulas, so that a match result can be applied to two encrypted ratings and produce new encrypted ratings whose decrypted values match the accuracy of the standard algorithm.

What carries the argument

Fully homomorphic encryption applied directly to the rating-update arithmetic, allowing the server to evaluate the Elo formula on ciphertexts without ever decrypting the ratings.

If this is right

  • Matchmaking services can avoid storing plaintext ratings while still using skill-based pairing.
  • Security guarantees hold against an adversary who sees all encrypted traffic and controls the server.
  • The same encrypted-update pattern applies to any rating system whose formulas use only addition and multiplication.
  • Privacy regulations that limit collection of personal performance data become easier to satisfy.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Existing matchmaking platforms could adopt the scheme with only a change to the rating-storage layer.
  • The approach could be tested on other rating formulas such as Glicko or TrueSkill to measure accuracy loss.
  • Contact-tracing or social-compatibility apps that rely on numeric scores could reuse the same encrypted-update primitive.

Load-bearing premise

That the homomorphic operations required for each rating update finish fast enough to be usable in live matchmaking systems.

What would settle it

A side-by-side run on the same sequence of chess matches where the final decrypted H-Elo ratings differ from the plaintext Elo ratings by more than the tolerance shown in the paper, or where an adversary recovers any original rating from the ciphertexts.

Figures

Figures reproduced from arXiv: 2603.26407 by Antonis Michalas, Bin Liu, Mindaugas Budzys.

Figure 1
Figure 1. Figure 1: High-level Overview of H-Elo new proof and sends the proof to the SP. If SP can verify the proof, then he updates the local record and allows 𝑢𝑖 to continue matchmaking with others. 5.3 Construction H-Elo is executed in three parts (i) User Registration, (ii) Rating Up￾date, (iii) Rating Verification. The H-Elo protocol is constructed with six algorithms H-Elo = (Init, Register, Update, Announce, Attest, V… view at source ↗
Figure 2
Figure 2. Figure 2: The oracles O𝑓 that A has access to in ExpN-fairness Π,A . the registration algorithm. After that, it continues the protocol thereafter. Notice that the challenge oracle can be called on a user once, since any user in the system cannot register twice. At the end of the interaction, A outputs a guess 𝑏 ′ for the random bit. To prevent trivial wins, A is not allowed to take over any of the challenged users, … view at source ↗
Figure 3
Figure 3. Figure 3: The oracles Oℎ that A has access to in Expind Π,A . Proof Sketch. To win the N-round Fair Matchmaking game, the adversary A must produce a valid range proof together with a valid attestation that jointly authenticate a user’s identifier, an encrypted Elo value and the corresponding commitment bound to that value. There are only two possible ways in which the adversary can succeed in doing so: (1) the adver… view at source ↗
Figure 4
Figure 4. Figure 4: Opponent Number Cost Impact operation that is performed [47]. Additionally, the performance of TFHE is the best when the values are bound to 8-bit integers (2 8 ). While values upwards of 2 32 are possible, the performance of the scheme degrades and takes longer for the computations than other schemes [5, 47]. As such, we excluded TFHE as a choice. The remaining schemes are the exact HE schemes B/FV and BG… view at source ↗
Figure 6
Figure 6. Figure 6: Precision bits after 10 000 consecutive updates, [PITH_FULL_IMAGE:figures/full_fig_p016_6.png] view at source ↗
read the original abstract

Matchmaking has become a prevalent part in contemporary applications, being used in dating apps, social media, online games, contact tracing and in various other use-cases. However, most implementations of matchmaking require the collection of sensitive/personal data for proper functionality. As such, with this work we aim to reduce the privacy leakage inherent in matchmaking applications. We propose H-Elo, a Fully Homomorphic Encryption (FHE)-based, private rating system, which allows for secure matchmaking through the use of traditional rating systems. In this work, we provide the construction of H-Elo, analyse the security of it against a capable adversary as well as benchmark our construction in a chess-based rating update scenario. Through our experiments we show that H-Elo can achieve similar accuracy to a plaintext implementation, while keeping rating values private and secure. Additionally, we compare our work to other private matchmaking solutions as well as cover some future directions in the field of private matchmaking. To the best of our knowledge we provide one of the first private and secure rating system-based matchmaking protocols.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 2 minor

Summary. The manuscript proposes H-Elo, a fully homomorphic encryption (FHE)-based private rating system for matchmaking applications. It presents a construction that encrypts traditional Elo rating updates, analyzes security against a capable adversary, and reports chess-based benchmarks claiming accuracy comparable to plaintext Elo while preserving rating privacy.

Significance. If the accuracy equivalence and long-term stability hold, the work could enable privacy-preserving use of established rating systems in games, dating apps, and similar domains without exposing sensitive player data. Building directly on standard FHE primitives and conventional Elo mechanics is a strength for reproducibility.

major comments (3)
  1. [Abstract and benchmarks] The central accuracy claim (abstract) that H-Elo achieves similar accuracy to plaintext is unsupported by any quantitative data, tables, or error metrics. The benchmarks section must include specific comparisons (e.g., mean absolute rating deviation after 50+ sequential matches) to substantiate equivalence.
  2. [Construction] Elo updates rely on the nonlinear logistic 1/(1+10^((R_b-R_a)/400)). Any FHE approximation of the exponential and division (construction section) risks error accumulation and rating drift over repeated matches. The manuscript must specify the approximation technique (polynomial degree or fixed-point precision) and provide error-bound analysis or long-sequence experiments to rule out drift.
  3. [Security analysis] The security analysis against a capable adversary requires an explicit threat model (semi-honest vs. malicious) and a concrete argument that rating values remain private under the chosen FHE scheme; the current description leaves the model and reduction unclear.
minor comments (2)
  1. [Notation and benchmarks] Clarify notation for encrypted values (e.g., consistent use of [[R]] or similar) and provide the exact FHE parameter set (security level, ring dimension) used in benchmarks.
  2. [Benchmarks] Add runtime and memory figures for a single rating update to allow assessment of practicality.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We thank the referee for the constructive feedback. We address each major comment below and will revise the manuscript accordingly to strengthen the presentation of benchmarks, construction details, and security analysis.

read point-by-point responses
  1. Referee: [Abstract and benchmarks] The central accuracy claim (abstract) that H-Elo achieves similar accuracy to plaintext is unsupported by any quantitative data, tables, or error metrics. The benchmarks section must include specific comparisons (e.g., mean absolute rating deviation after 50+ sequential matches) to substantiate equivalence.

    Authors: We agree that the benchmarks section would benefit from more explicit quantitative metrics. In the revised version we will add tables reporting mean absolute rating deviation, root-mean-square error, and maximum deviation between H-Elo and plaintext Elo after 50, 100, and 200 sequential matches on the chess dataset, directly supporting the accuracy claim made in the abstract. revision: yes

  2. Referee: [Construction] Elo updates rely on the nonlinear logistic 1/(1+10^((R_b-R_a)/400)). Any FHE approximation of the exponential and division (construction section) risks error accumulation and rating drift over repeated matches. The manuscript must specify the approximation technique (polynomial degree or fixed-point precision) and provide error-bound analysis or long-sequence experiments to rule out drift.

    Authors: We will expand the construction section to explicitly state the polynomial approximation (including degree and fixed-point precision) used for the logistic function and the division operation. We will also add a dedicated error-bound analysis together with results from long-sequence experiments (up to several hundred matches) demonstrating that rating drift remains negligible under the chosen parameters. revision: yes

  3. Referee: [Security analysis] The security analysis against a capable adversary requires an explicit threat model (semi-honest vs. malicious) and a concrete argument that rating values remain private under the chosen FHE scheme; the current description leaves the model and reduction unclear.

    Authors: We will revise the security section to state the threat model explicitly (semi-honest adversary) and supply a concrete reduction to the semantic security of the underlying FHE scheme, showing that encrypted rating values remain indistinguishable from random values to the adversary. revision: yes

Circularity Check

0 steps flagged

No significant circularity in derivation chain

full rationale

The paper constructs H-Elo by applying standard FHE primitives to the conventional Elo rating update formula without any self-referential definitions, fitted parameters renamed as predictions, or load-bearing self-citations. Security claims rest on established FHE properties and the protocol is benchmarked against independent plaintext implementations. No steps reduce by construction to the paper's own inputs or prior author work.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claim rests on the standard properties of fully homomorphic encryption allowing computation on ciphertexts and on the security definition against a capable adversary; no free parameters or invented entities are introduced in the abstract.

axioms (1)
  • standard math Fully homomorphic encryption supports arbitrary computations on encrypted data while preserving semantic security
    Core property invoked for performing rating updates without decryption.

pith-pipeline@v0.9.0 · 5480 in / 1142 out tokens · 28976 ms · 2026-05-14T22:37:56.771100+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

51 extracted references · 51 canonical work pages · 1 internal anchor

  1. [1]

    Michel Abdalla, Dario Catalano, Romain Gay, and Bogdan Ursu. 2020. Inner- product functional encryption with fine-grained access control. InAsiacrypt 2020-26th Annual International Conference on the Theory and Application of Cryptology and Information Security. Vol. 12493. Springer, 467–497

  2. [2]

    Rashmi Agrawal, Anantha Chandrakasan, and Ajay Joshi. 2024. Heap: a fully homomorphic encryption accelerator with parallelized bootstrapping. In2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA). IEEE, 756–769

  3. [3]

    Rashmi Agrawal et al. 2023. High-precision rns-ckks on fixed but smaller word- size architectures: theory and application. InProceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 23–34

  4. [4]

    Shweta Agrawal, Rishab Goyal, and Junichi Tomida. 2021. Multi-input quadratic functional encryption from pairings. InAdvances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV 41. Springer, 208–238

  5. [5]

    Ahmad Al Badawi and Yuriy Polyakov. 2023. Demystifying bootstrapping in fully homomorphic encryption.Cryptology eprint archive

  6. [6]

    Ahmad Al Badawi et al. 2022. Openfhe: open-source fully homomorphic en- cryption library. InProceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography(WAHC’22). Association for Computing Machinery, Los Angeles, CA, USA, 53–63. doi:10.1145/3560827.3563379

  7. [7]

    Martin Albrecht et al. 2021. Homomorphic encryption standard.Protecting privacy through homomorphic encryption, 31–62

  8. [8]

    Martin R Albrecht, Rachel Player, and Sam Scott. 2015. On the concrete hardness of learning with errors.Journal of Mathematical Cryptology, 9, 3, 169–203. CODASPY ’26, June 23–25, 2026, Frankfurt am Main, Germany Mindaugas Budzys, Bin Liu, and Antonis Michalas

  9. [9]

    Amanda Askell et al. 2021. A general language assistant as a laboratory for alignment.arXiv preprint arXiv:2112.00861

  10. [10]

    Giuseppe Ateniese, Danilo Francati, David Nunez, and Daniele Venturi. 2021. Match me if you can: matchmaking encryption and its applications.Journal of Cryptology, 34, 1–50

  11. [11]

    Nuttapong Attrapadung and Shota Yamada. 2015. Duality in abe: converting attribute based encryption for dual predicate and dual policy via computational encodings. InTopics in Cryptology—CT-RSA 2015: The Cryptographer’s Track at the RSA Conference 2015. Springer, 87–105

  12. [12]

    Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P Ward. 2019. Aurora: transparent succinct arguments for r1cs. InAdvances in Cryptology–EUROCRYPT 2019: 38th Annual Interna- tional Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I ...

  13. [13]

    Dan Boneh, Amit Sahai, and Brent Waters. 2011. Functional encryption: defini- tions and challenges. InTheory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011.Springer, 253–273

  14. [14]

    Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2014. (leveled) fully homomorphic encryption without bootstrapping.ACM Transactions on Computation Theory (TOCT), 6, 3, 1–36

  15. [15]

    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. A full rns variant of approximate homomorphic encryption. In International Conference on Selected Areas in Cryptography. Springer, 347–368

  16. [16]

    Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. Bootstrapping for approximate homomorphic encryption. InAn- nual International Conference on the Theory and Applications of Cryptographic Techniques

  17. [17]

    Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homo- morphic encryption for arithmetic of approximate numbers. InInternational Conference on the Theory and Application of Cryptology and Information Security. Springer

  18. [18]

    Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène. 2020. Tfhe: fast fully homomorphic encryption over the torus.Journal of Cryptology

  19. [19]

    Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, and Michael Rosenberg. 2021. Labeled psi from homomorphic encryption with reduced computation and communication. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communica- tions Security, 1135–1150

  20. [20]

    Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homo- morphic encryption.Cryptology ePrint Archive

  21. [21]

    Amos Fiat and Adi Shamir. 1986. How to prove yourself: practical solutions to identification and signature problems. InCRYPTO. (Jan. 1986)

  22. [22]

    Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, and Jaspal Singh. 2021. Private set operations from oblivious switching. InIACR international conference on public-key cryptography. Springer, 591–617

  23. [23]

    2009.A fully homomorphic encryption scheme

    Craig Gentry. 2009.A fully homomorphic encryption scheme. Stanford univer- sity

  24. [24]

    Mark E Glickman. 1995. A comprehensive guide to chess ratings.American Chess Journal, 3, 1, 59–102

  25. [25]

    Mark E Glickman. 2012. Example of the glicko-2 system.Boston University, 28

  26. [26]

    Mark E Glickman and Albyn C Jones. 1999. Rating the chess rating system. CHANCE-BERLIN THEN NEW YORK-, 12, 21–28

  27. [27]

    Shafi Goldwasser, Silvio Micali, and Chales Rackoff. 2019. The knowledge complexity of interactive proof-systems. InProviding sound foundations for cryptography: On the work of shafi goldwasser and silvio micali, 203–225

  28. [28]

    Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute- based encryption for fine-grained access control of encrypted data. InProceed- ings of the 13th ACM conference on Computer and communications security

  29. [29]

    Shai Halevi and Victor Shoup. 2020. Design and implementation of helib: a homomorphic encryption library.Cryptology ePrint Archive

  30. [30]

    Yuanyuan He, Xinyu Tan, Jianbing Ni, Laurence T Yang, and Xianjun Deng

  31. [31]

    Differentially private set intersection for asymmetrical id alignment.IEEE Transactions on Information Forensics and Security, 17, 3479–3494

  32. [32]

    Andrey Kim, Yuriy Polyakov, and Vincent Zucca. 2021. Revisiting homomor- phic encryption schemes for finite fields. InInternational Conference on the Theory and Application of Cryptology and Information Security. Springer

  33. [33]

    Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. 2016. Efficient batched oblivious prf with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communica- tions Security, 818–829

  34. [34]

    Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, and Jong-Seon No. 2021. High-precision bootstrapping of rns-ckks homomorphic encryption using optimal minimax polynomial approximation and inverse sine function. In Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques. S...

  35. [35]

    Yehuda Lindell and Ariel Nof. 2018. Fast secure multiparty ECDSA with practi- cal distributed key generation and applications to cryptocurrency custody. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communica- tions Security CCS. ACM, 1837–1854

  36. [36]

    Feng-Hao Liu, En Zhang, and Leiyong Qin. 2023. Efficient multiparty probabilis- tic threshold private set intersection. InProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2188–2201

  37. [37]

    Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Maxime Plançon. 2022. Lattice- based zero-knowledge proofs and applications: shorter, simpler, and more general. InAdvances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, Proceedings, Part II. Springer, 71–101

  38. [38]

    C Nuoskala, H Abdinasibfar, and A Michalas. 2024. Spade: digging into se- lective and partial decryption using functional encryption. InThe 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’24). EAI

  39. [39]

    Benny Pinkas, Thomas Schneider, Christian Weinert, and Udi Wieder. 2018. Ef- ficient circuit-based psi via cuckoo hashing. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 125–157

  40. [40]

    Benny Pinkas, Thomas Schneider, and Michael Zohner. 2018. Scalable pri- vate set intersection based on ot extension.ACM Transactions on Privacy and Security, 21, 2, 1–35

  41. [41]

    Ulrich Pörschmann, Fritz Trillmich, Birte Mueller, and Jochen BW Wolf. 2010. Male reproductive success and its behavioural correlates in a polygynous mammal, the galápagos sea lion (zalophus wollebaeki).Molecular Ecology

  42. [42]

    Peter Rindal and Mike Rosulek. 2017. Improved private set intersection against malicious adversaries. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 235–259

  43. [43]

    Ronald L Rivest, Len Adleman, Michael L Dertouzos, et al. 1978. On data banks and privacy homomorphisms.Foundations of secure computation, 4, 11

  44. [44]

    Michael Rosenberg, Jacob White, Christina Garman, and Ian Miers. 2023. Zk- creds: flexible anonymous credentials from zksnarks and existing identity infrastructure. In2023 IEEE Symposium on Security and Privacy (SP). IEEE

  45. [45]

    Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. InAd- vances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques

  46. [46]

    Adi Shamir. 1985. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4. Springer, 47–53

  47. [47]

    Calvin Hartono Soemardi, Mario Indra Radityaputra, Raiza Rahman, Alexan- der Agung Santoso Gunawan, and Karen Etania Saputra. 2023. Testing how dating apps recommend a potential matches for user. In2023 8th International Conference on Information Technology and Digital Applications (ICITDA). IEEE

  48. [48]

    Arisa Tsuji and Masato Oguchi. 2024. Comparison of fhe schemes and libraries for efficient cryptographic processing. In2024 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society

  49. [49]

    Niki Veček, Matej Črepinšek, Marjan Mernik, and Dejan Hrnčič. 2014. A com- parison between different chess rating systems for ranking evolutionary al- gorithms. In2014 Federated Conference on Computer Science and Information Systems. IEEE, 511–518

  50. [50]

    Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang. 2021. Mystique: efficient conversions for {zero-knowledge} proofs with applications to machine learning. In30th USENIX Security Symposium (USENIX Security 21)

  51. [51]

    Mingli Wu and Tsz Hon Yuen. 2023. Efficient unbalanced private set intersec- tion cardinality and user-friendly privacy-preserving contact tracing. In32nd USENIX Security Symposium (USENIX Security 23), 283–300. A Design Rationale To implement H-Elo it was important to decide on the HE scheme we would utilise for the homomorphic operations. The main schem...