Oblivious Linear Group Actions and Applications

被引:5
|
作者
Attrapadung, Nuttapong [1 ]
Hanaoaka, Goichiro [1 ]
Matsuda, Takahiro [1 ]
Morita, Hiraku [2 ]
Ohara, Kazuma [1 ]
Schuldt, Jacob C. N. [1 ]
Teruya, Tadanori [1 ]
Tozawa, Kazunari [3 ]
机构
[1] AIST, Tsukuba, Ibaraki, Japan
[2] Univ St Gallen, St Gallen, Switzerland
[3] Univ Tokyo, Tokyo, Japan
关键词
secure computation; secret sharing; oblivious shuffle; oblivious sorting; MULTIPARTY COMPUTATION; EQUALITY;
D O I
10.1145/3460120.3484584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose efficient two-party protocols for obliviously applying a (possibly random) linear group action to a data set. Our protocols capture various applications such as oblivious shuffles, circular shifts, matrix multiplications, to name just a few. A notable feature enjoyed by our protocols, is that they admit a roundoptimal (more precisely, one-round) online computation phase, once an input-independent off-line computation phase has been completed. Our oblivious shuffle is the first to achieve a round-optimal online phase. The most efficient instantiations of our protocols are obtained in the so-called client-aided client-server setting, where the offline phase is run by a semi-honest input party (client) who will then distribute the generated correlated randomness to the computing parties (servers). When comparing the total running time to the previous best two-party oblivious shuffle protocol by Chase et al. (Asiacrypt 2020), our shuffle protocol in this client-aided setting is up to 105 times and 152 times faster, in the LAN and WAN setting, respectively. We additionally show how the Chase et al. protocol (which is a standard two-party protocol) can be modified to leverage the advantages of the client-aided setting, but show that, even doing so, our scheme is still two times faster in the online phase and 1.34 times faster in total on average. An additional feature of our protocols is that they allow to re-invoke a previously generated group action, or its inverse, in subsequent runs. This allows us to utilize randomize-then-reveal techniques, which are crucial for constructing efficient protocols in complex applications. As an application, we construct a new oblivious sorting protocol implementing radix sort. Our protocol is based on a similar approach to the three-party protocol by Chida et al. (IACR ePrint 2019/965), but using our oblivious shuffle as a building block as well as various optimizations, we obtain a two-party protocol (in the client-aided setting) with improved online running time and a reduced number of rounds. As other applications, we also obtain efficient protocols for oblivious selection, oblivious unit-vectorization, oblivious multiplexer, oblivious polynomial evaluation, arithmetic-to-boolean share conversions, and more.
引用
收藏
页码:630 / 650
页数:21
相关论文
共 50 条
  • [21] Linear and nonlinear group actions, and the Newton Institute Program
    Scott, L
    ALGEBRAIC GROUPS AND THEIR REPRESENTATIONS, 1998, 517 : 1 - 23
  • [22] ENHANCED ADJOINT ACTIONS AND THEIR ORBITS FOR THE GENERAL LINEAR GROUP
    Nishiyama, Kyo
    Ohta, Takuya
    PACIFIC JOURNAL OF MATHEMATICS, 2019, 298 (01) : 141 - 155
  • [23] Separating invariants for arbitrary linear actions of the additive group
    Dufresne, Emilie
    Elmer, Jonathan
    Sezer, Mufit
    MANUSCRIPTA MATHEMATICA, 2014, 143 (1-2) : 207 - 219
  • [24] GROUP-ACTIONS ON LINEAR PREDICTORS FOR NONSTATIONARY PROCESSES
    NAKAMURA, Y
    IMA JOURNAL OF MATHEMATICAL CONTROL AND INFORMATION, 1988, 5 (01) : 69 - 75
  • [26] Cache-Oblivious and Data-Oblivious Sorting and Applications
    Chan, T-H. Hubert
    Guo, Yue
    Lin, Wei-Kai
    Shi, Elaine
    SODA'18: PROCEEDINGS OF THE TWENTY-NINTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2018, : 2201 - 2220
  • [27] Group Oblivious Message Retrieval
    Liu, Zeyu
    Tromer, Eran
    Wang, Yunhao
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 4367 - 4385
  • [28] Oblivious Parallel RAM and Applications
    Boyle, Elette
    Chung, Kai-Min
    Pass, Rafael
    THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 : 175 - 204
  • [29] APPLICATIONS OF GROUP ACTIONS ON FINITE COMPLEXES TO Q MANIFOLDS
    NEWMAN, LS
    NOTICES OF THE AMERICAN MATHEMATICAL SOCIETY, 1975, 22 (06): : A649 - A649
  • [30] ON OBLIVIOUS BRANCHING PROGRAMS OF LINEAR LENGTH
    KRAUSE, M
    WAACK, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 380 : 287 - 296