Oblivious Key-Value Stores and Amplification for Private Set Intersection

被引:41
|
作者
Garimella, Gayathri [1 ]
Pinkas, Benny [2 ]
Rosulek, Mike [1 ]
Ni Trieu [3 ]
Yanai, Avishay [4 ]
机构
[1] Oregon State Univ, Corvallis, OR 97331 USA
[2] Bar Ilan Univ, Ramat Gan, Israel
[3] Arizona State Univ, Tempe, AZ USA
[4] VMware Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-84245-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We consider the more general notion of an oblivious key-value store (OKVS), which is a data structure that compactly represents a desired mapping k(i) -> v(i). When the v(i) values are random, the OKVS data structure hides the k(i) values that were used to generate it. The simplest (and size-optimal) OKVS is a polynomial p that is chosen using interpolation such that p(k(i)) = v(i). We initiate the formal study of oblivious key-value stores, and show new constructions resulting in the fastest OKVS to date. Similarly to cuckoo hashing, current analysis techniques are insufficient for finding concrete parameters to guarantee a small failure probability for our OKVS constructions. Moreover, it would cost too much to run experiments to validate a small upperbound on the failure probability. We therefore show novel techniques to amplify an OKVS construction which has a failure probability p, to an OKVS with a similar overhead and failure probability p(c). Setting p to be moderately small enables to validate it by running a relatively small number of O(1/p) experiments. This validates a p(c) failure probability for the amplified OKVS. Finally, we describe how OKVS can significantly improve the state of the art of essentially all variants of PSI. This leads to the fastest two-party PSI protocols to date, for both the semi-honest and the malicious settings. Specifically, in networks with moderate bandwidth (e.g., 30-300 Mbps) our malicious two-party PSI protocol has 40% less communication and is 20-40% faster than the previous state of the art protocol, even though the latter only has heuristic confidence.
引用
下载
收藏
页码:395 / 425
页数:31
相关论文
共 50 条
  • [1] Private Set Intersection Based on Lightweight Oblivious Key-Value Storage Structure
    Jiang, Zhengtao
    Guo, Xiaoxuan
    Yu, Ting
    Zhou, Hanyu
    Wen, Jiaqi
    Wu, Zhengyang
    SYMMETRY-BASEL, 2023, 15 (11):
  • [2] Private Search on Key-Value Stores with Hierarchical Indexes
    Hu, Haibo
    Xu, Jianliang
    Xu, Xizhong
    Pei, Kexin
    Choi, Byron
    Zhou, Shuigeng
    2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2014, : 628 - 639
  • [3] Encrypted Key-Value Stores
    Agarwal, Archita
    Kamara, Seny
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 62 - 85
  • [4] Fast Scans on Key-Value Stores
    Pilman, Markus
    Bocksrocker, Kevin
    Braun, Lucas
    Marroquin, Renato
    Kossmann, Donald
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 10 (11): : 1526 - 1537
  • [5] Scalable Versioning for Key-Value Stores
    Haeusler, Martin
    DATA: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA MANAGEMENT TECHNOLOGIES AND APPLICATIONS, 2016, : 79 - 86
  • [6] Parallax: Hybrid Key-Value Placement in LSM-based Key-Value Stores
    Xanthakis, Giorgos
    Saloustros, Giorgos
    Batsaras, Nikos
    Papagiannis, Anastasios
    Bilas, Angelos
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '21), 2021, : 305 - 318
  • [7] Towards Elastic Key-value Stores on IaaS
    Li, Han
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2013, : 302 - 305
  • [8] A Design for Scalable and Secure Key-value Stores
    Chen, Longbin
    Dai, Wenyun
    Qiu, Meikang
    Jiang, Ning
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 216 - 221
  • [9] Integrity Verification in Cloud Key-Value Stores
    Weintraub, Grisha
    Rise, Leonid
    Kadosh, Alon
    PROCEEDINGS OF THE 15TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS AND STORAGE, SYSTOR 2022, 2022, : 140 - 140
  • [10] Robust Data Sharing with Key-Value Stores
    Basescu, Cristina
    Cachin, Christian
    Eyal, Ittay
    Haas, Robert
    Sorniotti, Alessandro
    Vukolic, Marko
    Zachevsky, Ido
    2012 42ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2012,