Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

被引:0
|
作者
Rafael Tonicelli
Anderson C. A. Nascimento
Rafael Dowsley
Jörn Müller-Quade
Hideki Imai
Goichiro Hanaoka
Akira Otsuka
机构
[1] University of Brasilia,Department of Electrical Engineering
[2] Karlsruhe Institute of Technology,Institute of Theoretical Informatics
[3] National Institute of Advanced Industrial Science and Technology (AIST),undefined
关键词
Information-theoretic cryptography; Cryptographic primitives; Oblivious polynomial evaluation; Commodity-based model;
D O I
暂无
中图分类号
学科分类号
摘要
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial p(x)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p(x)$$\end{document} and a receiver inputs a single value x0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$x_{0}$$\end{document}. At the end of the protocol, the sender learns nothing and the receiver learns p(x0)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p(x_{0})$$\end{document}. This paper deals with the problem of oblivious polynomial evaluation under an information-theoretic perspective, which is based on the definitions of unconditional security developed by Crépeau et al. (Information-theoretic conditions for two-party secure function evaluation. EUROCRYPT 2006, LNCS 4004. Springer, Berlin, Heidelberg, pp 538–554, 2006). In this paper, we propose an information-theoretic model for oblivious polynomial evaluation relying on pre-distributed data and prove very general lower bounds on the size of the pre-distributed data, as well as the size of the communications in any protocol. It is demonstrated that these bounds are tight by obtaining a round-optimal OPE protocol, which meets the lower bounds simultaneously. We present a natural generalization to OPE called oblivious linear functional evaluation.
引用
收藏
页码:73 / 84
页数:11
相关论文
共 50 条
  • [1] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Tonicelli, Rafael
    Nascimento, Anderson C. A.
    Dowsley, Rafael
    Mueller-Quade, Joern
    Imai, Hideki
    Hanaoka, Goichiro
    Otsuka, Akira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) : 73 - 84
  • [2] Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructions
    Hanaoka, G
    Imai, H
    Mueller-Quade, J
    Nascimento, ACA
    Otsuka, A
    Winter, A
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 62 - 73
  • [3] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 165 - 167
  • [4] Information-theoretically secure keyless authentication
    Korjik, V
    Bakin, M
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
  • [5] Information-Theoretically Secure Key Generation and Management
    Yang, En-Hui
    Wu, Xin-Wen
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
  • [6] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 635 - 652
  • [7] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
  • [8] On Optimal Information-Theoretically Secure Key Management
    Yang, En-Hui
    Wu, Xin-Wen
    2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [9] Parallel reducibility for information-theoretically secure computation
    Dodis, Y
    Micali, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
  • [10] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    Almanee, Sumaya
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 843 - 864