Efficient protocols for oblivious linear function evaluation from ring-LWE

被引:3
|
作者
Baum, Carsten [1 ]
Escudero, Daniel [1 ]
Pedrouzo-Ulloa, Alberto [2 ]
Scholl, Peter [1 ]
Troncoso-Pastoriza, Juan Ramon [3 ]
机构
[1] Aarhus Univ, Comp Sci, Aarhus, Denmark
[2] Univ Vigo, AtlanTT Res Ctr, Vigo, Galicia, Spain
[3] Ecole Polytech Fed Lausanne, Lab Data Secur, Lausanne, Switzerland
基金
欧洲研究理事会;
关键词
Oblivious linear evaluation; two-party computation; cryptographic protocols; ring learning with errors; zero-knowledge arguments; COMPUTATION; ENCRYPTION;
D O I
10.3233/JCS-200116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function f (x) = ax + b, where a sender inputs the field elements a, b, and a receiver inputs x and learns f (x). OLE can be used to build secret-shared multiplication, and is an essential component of many secure computation applications including general-purpose multi-party computation, private set intersection and more. In this work, we present several efficient OLE protocols from the ring learning with errors (RLWE) assumption. Technically, we build two new passively secure protocols, which build upon recent advances in homomorphic secret sharing from (R)LWE (Boyle et al. in: EUROCRYPT 2019, Part II (2019) 3-33 Springer), with optimizations tailored to the setting of OLE. We upgrade these to active security using efficient amortized zero-knowledge techniques for lattice relations (Baum et al. in: CRYPTO 2018, Part II (2018) 669-699 Springer), and design new variants of zero-knowledge arguments that are necessary for some of our constructions. Our protocols offer several advantages over existing constructions. Firstly, they have the lowest communication complexity amongst previous, practical protocols from RLWE and other assumptions; secondly, they are conceptually very simple, and have just one round of interaction for the case of OLE where b is randomly chosen. We demonstrate this with an implementation of one of our passively secure protocols, which can perform more than 1 million OLEs per second over the ring Z(m), for a 120-bit modulus m, on standard hardware.
引用
收藏
页码:39 / 78
页数:40
相关论文
共 48 条
  • [1] Efficient Software Implementation of Ring-LWE Encryption
    de Clercq, Ruan
    Roy, Sujoy Sinha
    Vercauteren, Frederik
    Verbauwhede, Ingrid
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 339 - 344
  • [2] Consideration on Defining Field for Efficient Ring-LWE
    Yamada, Rintaro
    Okumura, Shinya
    Miyaji, Atsuko
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 25 - 32
  • [3] XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE
    Lin, Chengyu
    Liu, Zeyu
    Malkin, Tal
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 217 - 236
  • [4] Trapdoor function based on the Ring-LWE and applications in communications
    Zhang, Chengli
    Ma, Wenping
    Zhao, Feifei
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1821 - 1827
  • [5] Trapdoor function based on the Ring-LWE and applications in communications
    Chengli Zhang
    Wenping Ma
    Feifei Zhao
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1821 - 1827
  • [6] Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
    Carpov, Sergiu
    Stan, Oana
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 265 - 281
  • [7] Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
    Chen, Yuyue
    Huang, Ruwei
    Yang, Bo
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [8] An Efficient Dispersal Storage Scheme Based on Ring-LWE and NTT
    Yang, Ling
    Lu, Xianhui
    2017 12TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2017, : 23 - 30
  • [9] Efficient Software Implementation of Ring-LWE Encryption on IoT Processors
    Liu, Zhe
    Azarderakhsh, Reza
    Kim, Howon
    Seo, Hwajeong
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (10) : 1424 - 1433
  • [10] Efficient Ring-LWE Encryption on 8-Bit AVR Processors
    Liu, Zhe
    Seo, Hwajeong
    Roy, Sujoy Sinha
    Grossschadl, Johann
    Kim, Howon
    Verbauwhede, Ingrid
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 663 - 682