Function Secret Sharing: Improvements and Extensions

被引:159
|
作者
Boyle, Elette [1 ]
Gilboa, Niv [2 ]
Ishai, Yuval [3 ,4 ]
机构
[1] IDC Herzliya, Herzliyya, Israel
[2] Ben Gurion Univ Negev, Beer Sheva, Israel
[3] Technion, Haifa, Israel
[4] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Function secret sharing; private information retrieval; secure multiparty computation; homomorphic encryption; ARGUMENTS;
D O I
10.1145/2976749.2978429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f: {0, 1}(n) -> G, for some abelian group G, into functions f(1),....,f(m), , described by keys k(1),..., k(m), such that f = f(1) +...+f(m) and every strict subset of the keys hides f. A Distributed Point Function (DPF) is a special case where F is the family of point functions, namely functions f(alpha,beta) 3 that evaluate to beta on the input a and to 0 on all other inputs. FSS schemes are useful for applications that involve privately reading from or writing to distributed databases while minimizing the amount of communication. These include different flavors of private information retrieval (PIR), as well as a recent application of DPF for large-scale anonymous messaging. We improve and extend previous results in several ways: Simplified FSS constructions. We introduce a tensoring operation for FSS which is used to obtain a conceptually simpler derivation of previous constructions and present our new constructions. Improved 2-party DPF. We reduce the key size of the PRG-based DPF scheme of Boyle et al. roughly by a factor of 4 and optimize its computational cost. The optimized DPF significantly improves the concrete costs of 2-server PIR and related primitives. FSS for new function families. We present an efficient PRG-based 2-party FSS scheme for the family of decision trees, leaking only the topology of the tree and the internal node labels. We apply this towards FSS for multi-dimensional intervals. We also present a general technique for extending FSS schemes by increasing the number of parties. Verifiable FSS. We present efficient protocols for verifying that keys (k(1)*, k(m)*), obtained from a potentially malicious user, are consistent with some f is an element of F. Such a verification may be critical for applications that involve private writing or voting by many users.
引用
收藏
页码:1292 / 1303
页数:12
相关论文
共 50 条
  • [41] MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
    HARN, L
    ELECTRONICS LETTERS, 1995, 31 (04) : 262 - 262
  • [42] Secure Function Evaluation based on Secret Sharing and Homomorphic Encryption
    Rane, Shantanu
    Sun, Wei
    Vetro, Anthony
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 827 - 834
  • [43] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [44] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [45] Secret sharing with secure secret reconstruction
    Harn, Lein
    Xia, Zhe
    Hsu, Chingfang
    Liu, Yining
    INFORMATION SCIENCES, 2020, 519 : 1 - 8
  • [46] Improvements of a two-in-one image secret sharing scheme based on gray mixing model
    Li, Peng
    Ma, Pei-Jun
    Su, Xiao-Hong
    Yang, Ching-Nung
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (03) : 441 - 453
  • [47] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [48] On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
    Aggarwal, Divesh
    Chung, Eldon
    Obremski, Maciej
    Ribeiro, Joao
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 327 - 354
  • [49] Fourier-Based Function Secret Sharing with General Access Structure
    Koshiba, Takeshi
    MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 417 - 428
  • [50] Generalization of Socio-Rational Secret Sharing with a New Utility Function
    Nojoumian, Mehrdad
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 338 - 341