Function Secret Sharing: Improvements and Extensions

作者: Elette Boyle , Niv Gilboa , Yuval Ishai

DOI: 10.1145/2976749.2978429

关键词:

摘要: Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing function from given family F. More concretely, an m-party FSS scheme splits f : {0, 1}n -> G, some abelian group into functions f1,...,fm, described keys k1,...,km, such that = f1 + ... fm and every strict subset of the hides f. A Distributed Point (DPF) is special case where F point functions, namely f_{a,b} evaluate to b on input 0 all other inputs. schemes are useful applications involve privately reading or writing distributed databases while minimizing amount communication. These include different flavors private information retrieval (PIR), as well recent application DPF large-scale anonymous messaging. We improve extend previous results in several ways: * Simplified constructions. introduce tensoring operation which used obtain conceptually simpler derivation constructions present our new Improved 2-party DPF. reduce key size PRG-based roughly factor 4 optimize its computational cost. The optimized significantly improves concrete costs 2-server PIR related primitives. families. efficient decision trees, leaking only topology tree internal node labels. apply this towards multi-dimensional intervals. also general technique extending increasing number parties. Verifiable FSS. protocols verifying (k*/1,...,k*/m ), obtained potentially malicious user, consistent with Such verification may be critical voting many users.

参考文章(28)
Moni Naor, Niv Gilboa, Benny Chor, Private Information Retrieval by Keywords CTIT technical reports series. ,(1997)
Niv Gilboa, Yuval Ishai, Distributed Point Functions and their Applications theory and application of cryptographic techniques. pp. 640- 658 ,(2014) , 10.1007/978-3-642-55220-5_35
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Elette Boyle, Niv Gilboa, Yuval Ishai, Function Secret Sharing theory and application of cryptographic techniques. pp. 337- 367 ,(2015) , 10.1007/978-3-662-46803-6_12
Donald Beaver, Efficient Multiparty Protocols Using Circuit Randomization international cryptology conference. pp. 420- 432 ,(1991) , 10.1007/3-540-46766-1_34
Henry Corrigan-Gibbs, Dan Boneh, David Mazieres, Riposte: An Anonymous Messaging System Handling Millions of Users 2015 IEEE Symposium on Security and Privacy. pp. 321- 338 ,(2015) , 10.1109/SP.2015.27
Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky, Single database private information retrieval implies oblivious transfer theory and application of cryptographic techniques. pp. 122- 138 ,(2000) , 10.1007/3-540-45539-6_10
Niv Gilboa, Two Party RSA Key Generation international cryptology conference. pp. 116- 129 ,(1999) , 10.1007/3-540-48405-1_8
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Omer Paneth, Rafail Ostrovsky, Succinct Non-interactive Arguments via Linear Interactive Proofs Theory of Cryptography. pp. 315- 333 ,(2013) , 10.1007/978-3-642-36594-2_18
Benny Chor, Niv Gilboa, Computationally private information retrieval (extended abstract) symposium on the theory of computing. pp. 304- 313 ,(1997) , 10.1145/258533.258609