Private Access Control for Function Secret Sharing

被引:2
|
作者
Servan-Schreiber, Sacha [1 ]
Beyzerov, Simon [2 ]
Yablon, Eli [2 ]
Park, Hyojae [2 ]
机构
[1] MIT, CSAIL, Cambridge, MA 02139 USA
[2] MIT, PRIMES, Cambridge, MA 02139 USA
关键词
D O I
10.1109/SP46215.2023.10179295
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f(x) for any input x, without learning information about f in the process. In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family F and an access control list defined over the family, the evaluators receiving the shares of f is an element of F can efficiently check that the dealer knows the access key for f. This model enables new applications of FSS, such as: (1) anonymous authentication in a multi-party setting, (2) access control in private databases, and (3) authentication and spam prevention in anonymous communication systems. Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest. We evaluate our constructions and show a 50-70x reduction in computational overhead compared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5-3x, when amortized over databases with 500,000 or more items.
引用
收藏
页码:809 / 828
页数:20
相关论文
共 50 条
  • [31] Private Evaluation of a Decision Tree Based on Secret Sharing
    Ahmed, Mohammad Nabil
    Shimizu, Kana
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 171 - 194
  • [32] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [33] Function Secret Sharing: Improvements and Extensions
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1292 - 1303
  • [34] Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
    Phalakarn, Kittiphop
    Suppakitpaisarn, Vorapong
    Attrapadung, Nuttapong
    Matsuura, Kanta
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2021, 2021, 12835 : 77 - 96
  • [35] FSS-DBSCAN: Outsourced Private Density-Based Clustering via Function Secret Sharing
    Fu, Jiaxuan
    Cheng, Ke
    Song, Anxiao
    Xia, Yuheng
    Chang, Zhao
    Shen, Yulong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7759 - 7773
  • [36] A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
    Yu, Yuyin
    Wang, Mingsheng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 136 - 142
  • [37] Threshold Secret Sharing Scheme for Compartmented Access Structures
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 1 - 9
  • [38] Dynamic key generations for secret sharing in access structures
    Lin, CH
    Lee, W
    Chen, CS
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 127 - 130
  • [39] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [40] Quantum secret sharing for a general quantum access structure
    Bai, Chen-Ming
    Li, Zhi-Hui
    Si, Meng-Meng
    Li, Yong-Ming
    EUROPEAN PHYSICAL JOURNAL D, 2017, 71 (10):