Reusable Non-Interactive Secure Computation

被引:18
|
作者
Chase, Melissa [1 ]
Dodis, Yevgeniy [2 ]
Ishai, Yuval [3 ]
Kraschewski, Daniel [4 ]
Liu, Tianren [5 ]
Ostrovsky, Rafail [6 ]
Vaikuntanathan, Vinod [5 ]
机构
[1] Microsoft Res, Redmond, WA USA
[2] NYU, New York, NY USA
[3] Technion, Haifa, Israel
[4] TNG Technol Consulting GmbH, Unterfohring, Germany
[5] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[6] Univ Calif Los Angeles, Los Angeles, CA USA
基金
美国国家科学基金会;
关键词
OBLIVIOUS TRANSFER;
D O I
10.1007/978-3-030-26954-8_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of Non-Interactive Two-Party Secure Computation (NISC), where Rachel wishes to publish an encryption of her input x, in such a way that any other party, who holds an input y, can send her a single message which conveys to her the value f(x, y), and nothing more. We demand security against malicious parties. While such protocols are easy to construct using garbled circuits and general non-interactive zero-knowledge proofs, this approach inherently makes a non-black-box use of the underlying cryptographic primitives and is infeasible in practice. Ishai et al. (Eurocrypt 2011) showed how to construct NISC protocols that only use parallel calls to an ideal oblivious transfer (OT) oracle, and additionally make only a black-box use of any pseudorandom generator. Combined with the efficient 2-message OT protocol of Peikert et al. (Crypto 2008), this leads to a practical approach to NISC that has been implemented in subsequent works. However, a major limitation of all known OT-based NISC protocols is that they are subject to selective failure attacks that allows a malicious sender to entirely compromise the security of the protocol when the receiver's first message is reused. Motivated by the failure of the OT-based approach, we consider the problem of basing reusable NISC on parallel invocations of a standard arithmetic generalization of OT known as oblivious linear-function evaluation (OLE). We obtain the following results: - We construct an information-theoretically secure reusable NISC protocol for arithmetic branching programs and general zero-knowledge functionalities in the OLE-hybrid model. Our zero-knowledge protocol only makes an absolute constant number of OLE calls per gate in an arithmetic circuit whose satisfiability is being proved. We also get reusable NISC in the OLE-hybrid model for general Boolean circuits using any one-way function. - We complement this by a negative result, showing that reusable NISC is impossible to achieve in the OT-hybrid model. This provides a formal justification for the need to replace OT by OLE. - We build a universally composable 2-message reusable OLE protocol in the CRS model that can be based on the security of Paillier encryption and requires only a constant number of modular exponentiations. This provides the first arithmetic analogue of the 2-message OT protocols of Peikert et al. (Crypto 2008). - By combining our NISC protocol in the OLE-hybrid model and the 2-message OLE protocol, we get protocols with new attractive asymptotic and concrete efficiency features. In particular, we get the first (designated-verifier) NIZK protocols for NP where following a statement-independent preprocessing, both proving and verifying are entirely "non-cryptographic" and involve only a constant computational overhead. Furthermore, we get the first statistical designatedverifier NIZK argument for NP under an assumption related to factoring.
引用
收藏
页码:462 / 488
页数:27
相关论文
共 50 条
  • [21] Adaptively secure non-interactive threshold cryptosystems
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2013, 478 : 76 - 100
  • [22] Non-interactive Classical Verification of Quantum Computation
    Alagic, Gorjan
    Childs, Andrew M.
    Grilo, Alex B.
    Hung, Shih-Han
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 153 - 180
  • [23] Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
    Kumar V.
    Kumar R.
    Pandey S.K.
    International Journal of Information Technology, 2020, 12 (1) : 283 - 288
  • [24] Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions
    Eriguchi, Reo
    Ohara, Kazuma
    Yamada, Shota
    Nuida, Koji
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 305 - 334
  • [25] Adaptively secure forward-secure non-interactive threshold cryptosystems
    Libert, Benoît
    Yung, Moti
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7537
  • [26] Secure Non-interactive Reduction and Spectral Analysis of Correlations
    Agarwal, Pratyush
    Narayanan, Varun
    Pathak, Shreya
    Prabhakaran, Manoj
    Prabhakaran, Vinod M.
    Rehan, Mohammad Ali
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 797 - 827
  • [27] SeED: Secure Non-Interactive Attestation for Embedded Devices
    Ibrahim, Ahmad
    Sadeghi, Ahmad-Reza
    Zeitouni, Shaza
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 64 - 74
  • [28] Non-Interactive Multiparty Computation Without Correlated Randomness
    Halevi, Shai
    Ishai, Yuval
    Jain, Abhishek
    Komargodski, Ilan
    Sahai, Amit
    Yogev, Eylon
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 181 - 211
  • [29] Multi-Client Non-interactive Verifiable Computation
    Choi, Seung Geol
    Katz, Jonathan
    Kumaresan, Ranjit
    Cid, Carlos
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 499 - 518
  • [30] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62