Efficient protocols for oblivious linear function evaluation from ring-LWE

被引:3
|
作者
Baum, Carsten [1 ]
Escudero, Daniel [1 ]
Pedrouzo-Ulloa, Alberto [2 ]
Scholl, Peter [1 ]
Troncoso-Pastoriza, Juan Ramon [3 ]
机构
[1] Aarhus Univ, Comp Sci, Aarhus, Denmark
[2] Univ Vigo, AtlanTT Res Ctr, Vigo, Galicia, Spain
[3] Ecole Polytech Fed Lausanne, Lab Data Secur, Lausanne, Switzerland
基金
欧洲研究理事会;
关键词
Oblivious linear evaluation; two-party computation; cryptographic protocols; ring learning with errors; zero-knowledge arguments; COMPUTATION; ENCRYPTION;
D O I
10.3233/JCS-200116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function f (x) = ax + b, where a sender inputs the field elements a, b, and a receiver inputs x and learns f (x). OLE can be used to build secret-shared multiplication, and is an essential component of many secure computation applications including general-purpose multi-party computation, private set intersection and more. In this work, we present several efficient OLE protocols from the ring learning with errors (RLWE) assumption. Technically, we build two new passively secure protocols, which build upon recent advances in homomorphic secret sharing from (R)LWE (Boyle et al. in: EUROCRYPT 2019, Part II (2019) 3-33 Springer), with optimizations tailored to the setting of OLE. We upgrade these to active security using efficient amortized zero-knowledge techniques for lattice relations (Baum et al. in: CRYPTO 2018, Part II (2018) 669-699 Springer), and design new variants of zero-knowledge arguments that are necessary for some of our constructions. Our protocols offer several advantages over existing constructions. Firstly, they have the lowest communication complexity amongst previous, practical protocols from RLWE and other assumptions; secondly, they are conceptually very simple, and have just one round of interaction for the case of OLE where b is randomly chosen. We demonstrate this with an implementation of one of our passively secure protocols, which can perform more than 1 million OLEs per second over the ring Z(m), for a 120-bit modulus m, on standard hardware.
引用
收藏
页码:39 / 78
页数:40
相关论文
共 48 条
  • [31] Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
    Ghosh, Satrajit
    Nielsen, Jesper Buus
    Nilges, Tobias
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 629 - 659
  • [32] Novel Low-Complexity Polynomial Multiplication Over Hybrid Fields for Efficient Implementation of Binary Ring-LWE Post-Quantum Cryptography
    He, Pengzhou
    Guin, Ujjwal
    Xie, Jiafeng
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 383 - 394
  • [33] Efficient Implementation of Finite Field Arithmetic for Binary Ring-LWE Post-Quantum Cryptography Through a Novel Lookup-Table-Like Method
    Xie, Jiafeng
    He, Pengzhou
    Wen, Wujie
    2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, : 1279 - 1284
  • [34] Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation
    Pedrouzo-Ulloa, Alberto
    Ramon Troncoso-Pastoriza, Juan
    Gama, Nicolas
    Georgieva, Mariya
    Perez-Gonzalez, Fernando
    2020 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2020,
  • [35] Two-Round Oblivious Linear Evaluation from Learning with Errors
    Branco, Pedro
    Doettling, Nico
    Mateus, Paulo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 379 - 408
  • [36] Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
    Chen, Hao
    Chillotti, Ilaria
    Ren, Ling
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 345 - 360
  • [37] Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
    Lin, Wei-Kai
    Mook, Ethan
    Wichs, Daniel
    PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 595 - 608
  • [38] Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation
    Imai, Hideki
    Morozov, Kirill
    Nascimento, Anderson C. A.
    INFORMATION THEORETIC SECURITY, 2009, 4883 : 183 - +
  • [39] For your phone only: custom protocols for efficient secure function evaluation on mobile devices
    Carter, Henry
    Amrutkar, Chaitrali
    Dacosta, Italo
    Traynor, Patrick
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1165 - 1176
  • [40] EFFICIENT EVALUATION OF LINEAR-RECURSIONS WITH FUNCTION SYMBOLS IN DEDUCTIVE DATABASES
    HAN, JW
    WANG, Q
    LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, 1991, 542 : 132 - 141