Oblivious Key-Value Stores and Amplification for Private Set Intersection

被引:41
|
作者
Garimella, Gayathri [1 ]
Pinkas, Benny [2 ]
Rosulek, Mike [1 ]
Ni Trieu [3 ]
Yanai, Avishay [4 ]
机构
[1] Oregon State Univ, Corvallis, OR 97331 USA
[2] Bar Ilan Univ, Ramat Gan, Israel
[3] Arizona State Univ, Tempe, AZ USA
[4] VMware Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-84245-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We consider the more general notion of an oblivious key-value store (OKVS), which is a data structure that compactly represents a desired mapping k(i) -> v(i). When the v(i) values are random, the OKVS data structure hides the k(i) values that were used to generate it. The simplest (and size-optimal) OKVS is a polynomial p that is chosen using interpolation such that p(k(i)) = v(i). We initiate the formal study of oblivious key-value stores, and show new constructions resulting in the fastest OKVS to date. Similarly to cuckoo hashing, current analysis techniques are insufficient for finding concrete parameters to guarantee a small failure probability for our OKVS constructions. Moreover, it would cost too much to run experiments to validate a small upperbound on the failure probability. We therefore show novel techniques to amplify an OKVS construction which has a failure probability p, to an OKVS with a similar overhead and failure probability p(c). Setting p to be moderately small enables to validate it by running a relatively small number of O(1/p) experiments. This validates a p(c) failure probability for the amplified OKVS. Finally, we describe how OKVS can significantly improve the state of the art of essentially all variants of PSI. This leads to the fastest two-party PSI protocols to date, for both the semi-honest and the malicious settings. Specifically, in networks with moderate bandwidth (e.g., 30-300 Mbps) our malicious two-party PSI protocol has 40% less communication and is 20-40% faster than the previous state of the art protocol, even though the latter only has heuristic confidence.
引用
收藏
页码:395 / 425
页数:31
相关论文
共 50 条
  • [41] GeoWave: Utilizing Distributed Key-Value Stores for Multidimensional Data
    Whitby, Michael A.
    Fecher, Rich
    Bennight, Chris
    ADVANCES IN SPATIAL AND TEMPORAL DATABASES, SSTD 2017, 2017, 10411 : 105 - 122
  • [42] Compressed Incremental Checkpointing for Efficient Replicated Key-Value Stores
    Guler, Berkin
    Ozkasap, Oznur
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 76 - 81
  • [43] Chisel: Reshaping Queries to Trim Latency in Key-Value Stores
    Birke, Robert
    Perez, Juan E.
    Ben Mokhtar, Sonia
    Rameshan, Navaneeth
    Chen, Lydia Y.
    2019 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC 2019), 2019, : 42 - 51
  • [44] BigSecret: A Secure Data Management Framework for Key-Value Stores
    Pattuk, Erman
    Kantarcioglu, Murat
    Khadilkar, Vaibhav
    Ulusoy, Huseyin
    Mehrotra, Sharad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 147 - 154
  • [45] Understanding and improvement of the selection of replica servers in key-value stores
    Jiang, Wanchun
    Xie, Haiming
    Zhou, Xiangqian
    Fang, Liyuan
    Wang, Jianxin
    INFORMATION SYSTEMS, 2019, 83 : 218 - 228
  • [46] Enabling Low Tail Latency on Multicore Key-Value Stores
    Lersch, Lucas
    Schreter, Ivan
    Oukid, Ismail
    Lehner, Wolfgang
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (07): : 1091 - 1104
  • [47] Consistent Low Latency Scheduler for Distributed Key-Value Stores
    Jiang, Wanchun
    Li, Haoyang
    Yan, Yulong
    Ji, Fa
    Huang, Jiawei
    Wang, Jianxin
    Zhang, Tong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (12) : 3012 - 3027
  • [48] A Novel Design to Support Skyline Query In Key-Value Stores
    Chang, Che-Wei
    Chu, Cheng-Lung
    Chao, Yu-Chang
    2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 813 - 818
  • [49] Elasticity Controller for Cloud-Based Key-Value Stores
    Arman, Ala
    Al-Shishtawy, Ahmad
    Vlassov, Vladimir
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 268 - 275
  • [50] Cryptographically Secure Information Flow Control on Key-Value Stores
    Waye, Lucas
    Buiras, Pablo
    Arden, Owen
    Russo, Alejandro
    Chong, Stephen
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1893 - 1907