Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS

被引:0
|
作者
Hiwatashi, Keitaro [1 ,3 ]
Nuida, Koji [2 ,3 ]
机构
[1] Univ Tokyo, Grad Sch Informat Sci & Technol, Tokyo, Japan
[2] Kyushu Univ, Inst Math Ind, Fukuoka, Japan
[3] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
关键词
function secret sharing; lower bounds; information-theoretic security;
D O I
10.1007/978-3-031-33491-7_20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Function Secret Sharing (FSS) is a cryptographic tool introduced by Boyle et al. (EUROCRYPT 2015) and is useful for several applications such as private information retrieval, oblivious-RAM, multiparty computation, etc. Most of the known FSS schemes are based on a pseudorandom generator and hence with computational security. In contrast, there are only a few known constructions of information-theoretic FSS, which are just for restricted function classes. It has not been well studied how efficient information-theoretic FSS can be in general. In this paper, we focus on (2-party) perfectly secure information-theoretic FSS and prove that the key size is explicitly (i.e., not just asymptotically) bounded below by the size of the subgroup generated by the function class. To the best of our knowledge, this is the first lower bound for information-theoretic FSS for an arbitrary function class. Our result shows that for several practically meaningful function classes, perfectly secure information-theoretic FSS must be much inefficient, not only asymptotically but also in practical parameters. Furthermore, we prove that this explicit lower bound is nearly tight by constructing perfectly secure information-theoretic FSS schemes for arbitrary function classes almost achieving our lower bound.
引用
收藏
页码:541 / 554
页数:14
相关论文
共 13 条
  • [1] CRYPTFLow2: Practical 2-Party Secure Inference
    Rathee, Deevashwer
    Rathee, Mayank
    Kumar, Nishant
    Chandran, Nishanth
    Gupta, Divya
    Rastogi, Aseem
    Sharma, Rahul
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 325 - 342
  • [2] A Linear-Time 2-Party Secure Merge Protocol
    Falk, Brett Hemenway
    Nema, Rohit
    Ostrovsky, Rafail
    [J]. CYBER SECURITY, CRYPTOLOGY, AND MACHINE LEARNING, 2022, 13301 : 408 - 427
  • [3] A Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique Problem
    Barak, Boaz
    Hopkins, Samuel B.
    Kelner, Jonathan
    Kothari, Pravesh
    Moitra, Ankur
    Potechin, Aaron
    [J]. 2016 IEEE 57TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2016, : 428 - 437
  • [4] A NEARLY TIGHT SUM-OF-SQUARES LOWER BOUND FOR THE PLANTED CLIQUE PROBLEM
    Barak, Boaz
    Hopkins, Samuel
    Kelner, Jonathan
    Kothari, Pravesh K.
    Moitra, Ankur
    Potechin, Aaron
    [J]. SIAM JOURNAL ON COMPUTING, 2019, 48 (02) : 687 - 735
  • [5] SECFLOAT: Accurate Floating-Point meets Secure 2-Party Computation
    Rathee, Deevashwer
    Bhattacharya, Anwesh
    Sharma, Rahul
    Gupta, Divya
    Chandran, Nishanth
    Rastogi, Aseem
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 576 - 595
  • [6] The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited
    Damgard, Ivan
    Nielsen, Jesper Buus
    Nielsen, Michael
    Ranellucci, Samuel
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 167 - 187
  • [7] Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution
    Rindal, Peter
    Rosulek, Mike
    [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 297 - 314
  • [8] Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 256 - 273
  • [9] CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (04): : 193 - 206
  • [10] A Tight Lower Bound on Adaptively Secure Full-Information Coin Flip
    Haitner, Iftach
    Karidi-Heller, Yonatan
    [J]. 2020 IEEE 61ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2020), 2020, : 1268 - 1276