How to Compress Encrypted Data

被引:1
|
作者
Fleischhacker, Nils [1 ]
Larsen, Kasper Green [2 ]
Simkin, Mark [3 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Aarhus Univ, Aarhus, Denmark
[3] Ethereum Fdn, Aarhus, Denmark
关键词
D O I
10.1007/978-3-031-30545-0_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the task of obliviously compressing a vector comprised of n ciphertexts of size xi bits each, where at most t of the corresponding plaintexts are non-zero. This problem commonly features in applications involving encrypted outsourced storages, such as searchable encryption or oblivious message retrieval. We present two new algorithms with provable worst-case guarantees, solving this problem by using only homomorphic additions and multiplications by constants. Both of our new constructions improve upon the state of the art asymptotically and concretely. Our first construction, based on sparse polynomials, is perfectly correct and the first to achieve an asymptotically optimal compression rate by compressing the input vector into O(t xi) bits. Compression can be performed homomorphically by performing O( n log n) homomorphic additions and multiplications by constants. The main drawback of this construction is a decoding complexity of ohm(root n). Our second construction is based on a novel variant of invertible bloom lookup tables and is correct with probability 1 - 2(-kappa). It has a slightly worse compression rate compared to our first construction as it compresses the input vector into O(xi kappa t/ log t) bits, where kappa >= log t. In exchange, both compression and decompression of this construction are highly efficient. The compression complexity is dominated by O(n kappa/ log t) homomorphic additions and multiplications by constants. The decompression complexity is dominated by O(kappa t/ log t) decryption operations and equally many inversions of a pseudorandom permutation.
引用
收藏
页码:551 / 577
页数:27
相关论文
共 50 条
  • [1] How to retrieve the encrypted data on the blockchain
    Li, Huige
    Zhang, Fangguo
    Luo, Peiran
    Tian, Haibo
    He, Jiejie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11) : 5560 - 5579
  • [2] How to Run Turing Machines on Encrypted Data
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Popa, Raluca Ada
    Vaikuntanathan, Vinod
    Zeldovich, Nickolai
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 536 - 553
  • [3] How to Compress Interactive Communication
    Barak, Boaz
    Braverman, Mark
    Chen, Xi
    Rao, Anup
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 67 - 76
  • [4] HOW TO COMPRESS INTERACTIVE COMMUNICATION
    Barak, Boaz
    Braverman, Mark
    Chen, Xi
    Rao, Anup
    SIAM JOURNAL ON COMPUTING, 2013, 42 (03) : 1327 - 1363
  • [5] How to Compress Asymmetric Communication
    Ramamoorthy, Sivaramakrishnan Natarajan
    Rao, Anup
    30TH CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC 2015), 2015, 33 : 102 - 123
  • [6] How to compress ultrashort vortex pulses
    Baca-Montero, Erick R.
    Andrade-Ambriz, Yair A.
    Shulika, Oleksiy V.
    APPLIED OPTICS, 2023, 62 (07) : B170 - B177
  • [7] STACK THAT DATA, COMPRESS THAT FILE
    FOX, B
    NEW SCIENTIST, 1993, 140 (1904) : 44 - 44
  • [8] Wavelets analyze and compress data
    不详
    MACHINE DESIGN, 1996, 68 (10) : 100 - 100
  • [9] How to compress rabin ciphertexts and signatures (and more)
    Gentry, C
    ADVANCS IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 179 - 200
  • [10] Partition and Code: learning how to compress graphs
    Bouritsas, Giorgos
    Loukas, Andreas
    Karalias, Nikolaos
    Bronstein, Michael M.
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34