Recognition: no theorem link
Hidden Elo: Private Matchmaking through Encrypted Rating Systems
Pith reviewed 2026-05-14 22:37 UTC · model grok-4.3
The pith
H-Elo updates player ratings on encrypted values so matchmaking proceeds without exposing ratings to the server.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
H-Elo supplies an encryption scheme whose ciphertexts support the addition and multiplication operations needed for Elo rating formulas, so that a match result can be applied to two encrypted ratings and produce new encrypted ratings whose decrypted values match the accuracy of the standard algorithm.
What carries the argument
Fully homomorphic encryption applied directly to the rating-update arithmetic, allowing the server to evaluate the Elo formula on ciphertexts without ever decrypting the ratings.
If this is right
- Matchmaking services can avoid storing plaintext ratings while still using skill-based pairing.
- Security guarantees hold against an adversary who sees all encrypted traffic and controls the server.
- The same encrypted-update pattern applies to any rating system whose formulas use only addition and multiplication.
- Privacy regulations that limit collection of personal performance data become easier to satisfy.
Where Pith is reading between the lines
- Existing matchmaking platforms could adopt the scheme with only a change to the rating-storage layer.
- The approach could be tested on other rating formulas such as Glicko or TrueSkill to measure accuracy loss.
- Contact-tracing or social-compatibility apps that rely on numeric scores could reuse the same encrypted-update primitive.
Load-bearing premise
That the homomorphic operations required for each rating update finish fast enough to be usable in live matchmaking systems.
What would settle it
A side-by-side run on the same sequence of chess matches where the final decrypted H-Elo ratings differ from the plaintext Elo ratings by more than the tolerance shown in the paper, or where an adversary recovers any original rating from the ciphertexts.
Figures
read the original abstract
Matchmaking has become a prevalent part in contemporary applications, being used in dating apps, social media, online games, contact tracing and in various other use-cases. However, most implementations of matchmaking require the collection of sensitive/personal data for proper functionality. As such, with this work we aim to reduce the privacy leakage inherent in matchmaking applications. We propose H-Elo, a Fully Homomorphic Encryption (FHE)-based, private rating system, which allows for secure matchmaking through the use of traditional rating systems. In this work, we provide the construction of H-Elo, analyse the security of it against a capable adversary as well as benchmark our construction in a chess-based rating update scenario. Through our experiments we show that H-Elo can achieve similar accuracy to a plaintext implementation, while keeping rating values private and secure. Additionally, we compare our work to other private matchmaking solutions as well as cover some future directions in the field of private matchmaking. To the best of our knowledge we provide one of the first private and secure rating system-based matchmaking protocols.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes H-Elo, a fully homomorphic encryption (FHE)-based private rating system for matchmaking applications. It presents a construction that encrypts traditional Elo rating updates, analyzes security against a capable adversary, and reports chess-based benchmarks claiming accuracy comparable to plaintext Elo while preserving rating privacy.
Significance. If the accuracy equivalence and long-term stability hold, the work could enable privacy-preserving use of established rating systems in games, dating apps, and similar domains without exposing sensitive player data. Building directly on standard FHE primitives and conventional Elo mechanics is a strength for reproducibility.
major comments (3)
- [Abstract and benchmarks] The central accuracy claim (abstract) that H-Elo achieves similar accuracy to plaintext is unsupported by any quantitative data, tables, or error metrics. The benchmarks section must include specific comparisons (e.g., mean absolute rating deviation after 50+ sequential matches) to substantiate equivalence.
- [Construction] Elo updates rely on the nonlinear logistic 1/(1+10^((R_b-R_a)/400)). Any FHE approximation of the exponential and division (construction section) risks error accumulation and rating drift over repeated matches. The manuscript must specify the approximation technique (polynomial degree or fixed-point precision) and provide error-bound analysis or long-sequence experiments to rule out drift.
- [Security analysis] The security analysis against a capable adversary requires an explicit threat model (semi-honest vs. malicious) and a concrete argument that rating values remain private under the chosen FHE scheme; the current description leaves the model and reduction unclear.
minor comments (2)
- [Notation and benchmarks] Clarify notation for encrypted values (e.g., consistent use of [[R]] or similar) and provide the exact FHE parameter set (security level, ring dimension) used in benchmarks.
- [Benchmarks] Add runtime and memory figures for a single rating update to allow assessment of practicality.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback. We address each major comment below and will revise the manuscript accordingly to strengthen the presentation of benchmarks, construction details, and security analysis.
read point-by-point responses
-
Referee: [Abstract and benchmarks] The central accuracy claim (abstract) that H-Elo achieves similar accuracy to plaintext is unsupported by any quantitative data, tables, or error metrics. The benchmarks section must include specific comparisons (e.g., mean absolute rating deviation after 50+ sequential matches) to substantiate equivalence.
Authors: We agree that the benchmarks section would benefit from more explicit quantitative metrics. In the revised version we will add tables reporting mean absolute rating deviation, root-mean-square error, and maximum deviation between H-Elo and plaintext Elo after 50, 100, and 200 sequential matches on the chess dataset, directly supporting the accuracy claim made in the abstract. revision: yes
-
Referee: [Construction] Elo updates rely on the nonlinear logistic 1/(1+10^((R_b-R_a)/400)). Any FHE approximation of the exponential and division (construction section) risks error accumulation and rating drift over repeated matches. The manuscript must specify the approximation technique (polynomial degree or fixed-point precision) and provide error-bound analysis or long-sequence experiments to rule out drift.
Authors: We will expand the construction section to explicitly state the polynomial approximation (including degree and fixed-point precision) used for the logistic function and the division operation. We will also add a dedicated error-bound analysis together with results from long-sequence experiments (up to several hundred matches) demonstrating that rating drift remains negligible under the chosen parameters. revision: yes
-
Referee: [Security analysis] The security analysis against a capable adversary requires an explicit threat model (semi-honest vs. malicious) and a concrete argument that rating values remain private under the chosen FHE scheme; the current description leaves the model and reduction unclear.
Authors: We will revise the security section to state the threat model explicitly (semi-honest adversary) and supply a concrete reduction to the semantic security of the underlying FHE scheme, showing that encrypted rating values remain indistinguishable from random values to the adversary. revision: yes
Circularity Check
No significant circularity in derivation chain
full rationale
The paper constructs H-Elo by applying standard FHE primitives to the conventional Elo rating update formula without any self-referential definitions, fitted parameters renamed as predictions, or load-bearing self-citations. Security claims rest on established FHE properties and the protocol is benchmarked against independent plaintext implementations. No steps reduce by construction to the paper's own inputs or prior author work.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Fully homomorphic encryption supports arbitrary computations on encrypted data while preserving semantic security
Reference graph
Works this paper leans on
-
[1]
Michel Abdalla, Dario Catalano, Romain Gay, and Bogdan Ursu. 2020. Inner- product functional encryption with fine-grained access control. InAsiacrypt 2020-26th Annual International Conference on the Theory and Application of Cryptology and Information Security. Vol. 12493. Springer, 467–497
work page 2020
-
[2]
Rashmi Agrawal, Anantha Chandrakasan, and Ajay Joshi. 2024. Heap: a fully homomorphic encryption accelerator with parallelized bootstrapping. In2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA). IEEE, 756–769
work page 2024
-
[3]
Rashmi Agrawal et al. 2023. High-precision rns-ckks on fixed but smaller word- size architectures: theory and application. InProceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 23–34
work page 2023
-
[4]
Shweta Agrawal, Rishab Goyal, and Junichi Tomida. 2021. Multi-input quadratic functional encryption from pairings. InAdvances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV 41. Springer, 208–238
work page 2021
-
[5]
Ahmad Al Badawi and Yuriy Polyakov. 2023. Demystifying bootstrapping in fully homomorphic encryption.Cryptology eprint archive
work page 2023
-
[6]
Ahmad Al Badawi et al. 2022. Openfhe: open-source fully homomorphic en- cryption library. InProceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography(WAHC’22). Association for Computing Machinery, Los Angeles, CA, USA, 53–63. doi:10.1145/3560827.3563379
-
[7]
Martin Albrecht et al. 2021. Homomorphic encryption standard.Protecting privacy through homomorphic encryption, 31–62
work page 2021
-
[8]
Martin R Albrecht, Rachel Player, and Sam Scott. 2015. On the concrete hardness of learning with errors.Journal of Mathematical Cryptology, 9, 3, 169–203. CODASPY ’26, June 23–25, 2026, Frankfurt am Main, Germany Mindaugas Budzys, Bin Liu, and Antonis Michalas
work page 2015
-
[9]
Amanda Askell et al. 2021. A general language assistant as a laboratory for alignment.arXiv preprint arXiv:2112.00861
work page internal anchor Pith review Pith/arXiv arXiv 2021
-
[10]
Giuseppe Ateniese, Danilo Francati, David Nunez, and Daniele Venturi. 2021. Match me if you can: matchmaking encryption and its applications.Journal of Cryptology, 34, 1–50
work page 2021
-
[11]
Nuttapong Attrapadung and Shota Yamada. 2015. Duality in abe: converting attribute based encryption for dual predicate and dual policy via computational encodings. InTopics in Cryptology—CT-RSA 2015: The Cryptographer’s Track at the RSA Conference 2015. Springer, 87–105
work page 2015
-
[12]
Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P Ward. 2019. Aurora: transparent succinct arguments for r1cs. InAdvances in Cryptology–EUROCRYPT 2019: 38th Annual Interna- tional Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I ...
work page 2019
-
[13]
Dan Boneh, Amit Sahai, and Brent Waters. 2011. Functional encryption: defini- tions and challenges. InTheory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011.Springer, 253–273
work page 2011
-
[14]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2014. (leveled) fully homomorphic encryption without bootstrapping.ACM Transactions on Computation Theory (TOCT), 6, 3, 1–36
work page 2014
-
[15]
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. A full rns variant of approximate homomorphic encryption. In International Conference on Selected Areas in Cryptography. Springer, 347–368
work page 2018
-
[16]
Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. Bootstrapping for approximate homomorphic encryption. InAn- nual International Conference on the Theory and Applications of Cryptographic Techniques
work page 2018
-
[17]
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homo- morphic encryption for arithmetic of approximate numbers. InInternational Conference on the Theory and Application of Cryptology and Information Security. Springer
work page 2017
-
[18]
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène. 2020. Tfhe: fast fully homomorphic encryption over the torus.Journal of Cryptology
work page 2020
-
[19]
Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, and Michael Rosenberg. 2021. Labeled psi from homomorphic encryption with reduced computation and communication. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communica- tions Security, 1135–1150
work page 2021
-
[20]
Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homo- morphic encryption.Cryptology ePrint Archive
work page 2012
-
[21]
Amos Fiat and Adi Shamir. 1986. How to prove yourself: practical solutions to identification and signature problems. InCRYPTO. (Jan. 1986)
work page 1986
-
[22]
Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, and Jaspal Singh. 2021. Private set operations from oblivious switching. InIACR international conference on public-key cryptography. Springer, 591–617
work page 2021
-
[23]
2009.A fully homomorphic encryption scheme
Craig Gentry. 2009.A fully homomorphic encryption scheme. Stanford univer- sity
work page 2009
-
[24]
Mark E Glickman. 1995. A comprehensive guide to chess ratings.American Chess Journal, 3, 1, 59–102
work page 1995
-
[25]
Mark E Glickman. 2012. Example of the glicko-2 system.Boston University, 28
work page 2012
-
[26]
Mark E Glickman and Albyn C Jones. 1999. Rating the chess rating system. CHANCE-BERLIN THEN NEW YORK-, 12, 21–28
work page 1999
-
[27]
Shafi Goldwasser, Silvio Micali, and Chales Rackoff. 2019. The knowledge complexity of interactive proof-systems. InProviding sound foundations for cryptography: On the work of shafi goldwasser and silvio micali, 203–225
work page 2019
-
[28]
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute- based encryption for fine-grained access control of encrypted data. InProceed- ings of the 13th ACM conference on Computer and communications security
work page 2006
-
[29]
Shai Halevi and Victor Shoup. 2020. Design and implementation of helib: a homomorphic encryption library.Cryptology ePrint Archive
work page 2020
-
[30]
Yuanyuan He, Xinyu Tan, Jianbing Ni, Laurence T Yang, and Xianjun Deng
-
[31]
Differentially private set intersection for asymmetrical id alignment.IEEE Transactions on Information Forensics and Security, 17, 3479–3494
-
[32]
Andrey Kim, Yuriy Polyakov, and Vincent Zucca. 2021. Revisiting homomor- phic encryption schemes for finite fields. InInternational Conference on the Theory and Application of Cryptology and Information Security. Springer
work page 2021
-
[33]
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. 2016. Efficient batched oblivious prf with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communica- tions Security, 818–829
work page 2016
-
[34]
Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, and Jong-Seon No. 2021. High-precision bootstrapping of rns-ckks homomorphic encryption using optimal minimax polynomial approximation and inverse sine function. In Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques. S...
work page 2021
-
[35]
Yehuda Lindell and Ariel Nof. 2018. Fast secure multiparty ECDSA with practi- cal distributed key generation and applications to cryptocurrency custody. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communica- tions Security CCS. ACM, 1837–1854
work page 2018
-
[36]
Feng-Hao Liu, En Zhang, and Leiyong Qin. 2023. Efficient multiparty probabilis- tic threshold private set intersection. InProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2188–2201
work page 2023
-
[37]
Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Maxime Plançon. 2022. Lattice- based zero-knowledge proofs and applications: shorter, simpler, and more general. InAdvances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, Proceedings, Part II. Springer, 71–101
work page 2022
-
[38]
C Nuoskala, H Abdinasibfar, and A Michalas. 2024. Spade: digging into se- lective and partial decryption using functional encryption. InThe 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’24). EAI
work page 2024
-
[39]
Benny Pinkas, Thomas Schneider, Christian Weinert, and Udi Wieder. 2018. Ef- ficient circuit-based psi via cuckoo hashing. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 125–157
work page 2018
-
[40]
Benny Pinkas, Thomas Schneider, and Michael Zohner. 2018. Scalable pri- vate set intersection based on ot extension.ACM Transactions on Privacy and Security, 21, 2, 1–35
work page 2018
-
[41]
Ulrich Pörschmann, Fritz Trillmich, Birte Mueller, and Jochen BW Wolf. 2010. Male reproductive success and its behavioural correlates in a polygynous mammal, the galápagos sea lion (zalophus wollebaeki).Molecular Ecology
work page 2010
-
[42]
Peter Rindal and Mike Rosulek. 2017. Improved private set intersection against malicious adversaries. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 235–259
work page 2017
-
[43]
Ronald L Rivest, Len Adleman, Michael L Dertouzos, et al. 1978. On data banks and privacy homomorphisms.Foundations of secure computation, 4, 11
work page 1978
-
[44]
Michael Rosenberg, Jacob White, Christina Garman, and Ian Miers. 2023. Zk- creds: flexible anonymous credentials from zksnarks and existing identity infrastructure. In2023 IEEE Symposium on Security and Privacy (SP). IEEE
work page 2023
-
[45]
Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. InAd- vances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques
work page 2005
-
[46]
Adi Shamir. 1985. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4. Springer, 47–53
work page 1985
-
[47]
Calvin Hartono Soemardi, Mario Indra Radityaputra, Raiza Rahman, Alexan- der Agung Santoso Gunawan, and Karen Etania Saputra. 2023. Testing how dating apps recommend a potential matches for user. In2023 8th International Conference on Information Technology and Digital Applications (ICITDA). IEEE
work page 2023
-
[48]
Arisa Tsuji and Masato Oguchi. 2024. Comparison of fhe schemes and libraries for efficient cryptographic processing. In2024 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society
work page 2024
-
[49]
Niki Veček, Matej Črepinšek, Marjan Mernik, and Dejan Hrnčič. 2014. A com- parison between different chess rating systems for ranking evolutionary al- gorithms. In2014 Federated Conference on Computer Science and Information Systems. IEEE, 511–518
work page 2014
-
[50]
Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang. 2021. Mystique: efficient conversions for {zero-knowledge} proofs with applications to machine learning. In30th USENIX Security Symposium (USENIX Security 21)
work page 2021
-
[51]
Mingli Wu and Tsz Hon Yuen. 2023. Efficient unbalanced private set intersec- tion cardinality and user-friendly privacy-preserving contact tracing. In32nd USENIX Security Symposium (USENIX Security 23), 283–300. A Design Rationale To implement H-Elo it was important to decide on the HE scheme we would utilise for the homomorphic operations. The main schem...
work page 2023
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.