Private Access Control for Function Secret Sharing

被引:2
|
作者
Servan-Schreiber, Sacha [1 ]
Beyzerov, Simon [2 ]
Yablon, Eli [2 ]
Park, Hyojae [2 ]
机构
[1] MIT, CSAIL, Cambridge, MA 02139 USA
[2] MIT, PRIMES, Cambridge, MA 02139 USA
关键词
D O I
10.1109/SP46215.2023.10179295
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f(x) for any input x, without learning information about f in the process. In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family F and an access control list defined over the family, the evaluators receiving the shares of f is an element of F can efficiently check that the dealer knows the access key for f. This model enables new applications of FSS, such as: (1) anonymous authentication in a multi-party setting, (2) access control in private databases, and (3) authentication and spam prevention in anonymous communication systems. Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest. We evaluate our constructions and show a 50-70x reduction in computational overhead compared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5-3x, when amortized over databases with 500,000 or more items.
引用
收藏
页码:809 / 828
页数:20
相关论文
共 50 条
  • [1] Access control and signatures via quorum secret sharing
    Naor, M
    Wool, A
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1998, 9 (09) : 909 - 922
  • [2] Function Secret Sharing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 337 - 367
  • [3] Fourier-Based Function Secret Sharing with General Access Structure
    Koshiba, Takeshi
    MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 417 - 428
  • [4] Secret Sharing Scheme: Vector Space Secret Sharing and φ Function
    Atici, Mustafa
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 914 - 918
  • [5] Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing
    Fu, Jiaxuan
    Cheng, Ke
    Xia, Yuheng
    Song, Anxiao
    Li, Qianxing
    Shen, Yulong
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 310 - 330
  • [6] Waldo: A Private Time-Series Database from Function Secret Sharing
    Dauterman, Emma
    Rathee, Mayank
    Popa, Raluca Ada
    Stoica, Ion
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2450 - 2468
  • [7] Secret sharing with access structures in a hierarchy
    Chang, CC
    Lin, CH
    Lee, W
    Hwang, PC
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 31 - 34
  • [8] Weakly-private secret sharing schemes
    Beimel, Amos
    Franklin, Matthew
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 253 - +
  • [9] Affine Boolean classification in secret image sharing for progressive quality access control
    Bhattacharjee, Tapasi
    Rout, Ranjeet Kumar
    Maity, Santi P.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 16 - 29
  • [10] Access control aware data retrieval for secret sharing based database outsourcing
    Mohammad Ali Hadavi
    Rasool Jalili
    Leila Karimi
    Distributed and Parallel Databases, 2016, 34 : 505 - 534