Function Secret Sharing: Improvements and Extensions

被引:159
|
作者
Boyle, Elette [1 ]
Gilboa, Niv [2 ]
Ishai, Yuval [3 ,4 ]
机构
[1] IDC Herzliya, Herzliyya, Israel
[2] Ben Gurion Univ Negev, Beer Sheva, Israel
[3] Technion, Haifa, Israel
[4] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
关键词
Function secret sharing; private information retrieval; secure multiparty computation; homomorphic encryption; ARGUMENTS;
D O I
10.1145/2976749.2978429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f: {0, 1}(n) -> G, for some abelian group G, into functions f(1),....,f(m), , described by keys k(1),..., k(m), such that f = f(1) +...+f(m) and every strict subset of the keys hides f. A Distributed Point Function (DPF) is a special case where F is the family of point functions, namely functions f(alpha,beta) 3 that evaluate to beta on the input a and to 0 on all other inputs. FSS schemes are useful for applications that involve privately reading from or writing to distributed databases while minimizing the amount of communication. These include different flavors of private information retrieval (PIR), as well as a recent application of DPF for large-scale anonymous messaging. We improve and extend previous results in several ways: Simplified FSS constructions. We introduce a tensoring operation for FSS which is used to obtain a conceptually simpler derivation of previous constructions and present our new constructions. Improved 2-party DPF. We reduce the key size of the PRG-based DPF scheme of Boyle et al. roughly by a factor of 4 and optimize its computational cost. The optimized DPF significantly improves the concrete costs of 2-server PIR and related primitives. FSS for new function families. We present an efficient PRG-based 2-party FSS scheme for the family of decision trees, leaking only the topology of the tree and the internal node labels. We apply this towards FSS for multi-dimensional intervals. We also present a general technique for extending FSS schemes by increasing the number of parties. Verifiable FSS. We present efficient protocols for verifying that keys (k(1)*, k(m)*), obtained from a potentially malicious user, are consistent with some f is an element of F. Such a verification may be critical for applications that involve private writing or voting by many users.
引用
收藏
页码:1292 / 1303
页数:12
相关论文
共 50 条
  • [1] Biometric Extensions for Secret Sharing Protocols
    Ogiela, Lidia
    Ogiela, Marek R.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 5 - 8
  • [2] Function Secret Sharing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 337 - 367
  • [3] Secret Sharing Scheme: Vector Space Secret Sharing and φ Function
    Atici, Mustafa
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 914 - 918
  • [4] Homomorphic extensions of CRT-based secret sharing
    Ersoy, Oguzhan
    Pedersen, Thomas Brochmann
    Anarim, Emin
    DISCRETE APPLIED MATHEMATICS, 2020, 285 (285) : 317 - 329
  • [5] Improvements to Almost Optimum Secret Sharing with Cheating Detection
    Cianciullo, Louis
    Ghodosi, Hossein
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 193 - 205
  • [6] ON QUANTUM EVOLVING SECRET SHARING SCHEMES - FURTHER STUDIES AND IMPROVEMENTS
    Chaudhury, Shion Samadder
    QUANTUM INFORMATION & COMPUTATION, 2022, 22 (5-6) : 385 - 407
  • [7] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [8] A New Approach to Construct Secret Sharing Schemes Based on Field Extensions
    Molla, Fatih
    Calkavur, Seda
    EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2018, 11 (02): : 468 - 475
  • [9] Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    Ulutas, Guzin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2009, 2009
  • [10] New cheating immune secret sharing function
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Beijing Youdian Daxue Xuebao, 2006, 4 (54-56):