Compressing Vector OLE

被引:109
作者
Boyle, Elette [1 ]
Couteau, Geoffroy [2 ]
Gilboa, Niv [3 ]
Ishai, Yuval [4 ]
机构
[1] IDC, Herzliyya, Israel
[2] KIT, Karlsruhe, Germany
[3] Ben Gurion Univ Negev, Beer Sheva, Israel
[4] Technion, Haifa, Israel
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
基金
欧洲研究理事会;
关键词
Secure computation; correlation generators; FSS; OLE; LPN; NIZK; MULTIPARTY COMPUTATION; OBLIVIOUS TRANSFER; CIRCUIT; PROOFS;
D O I
10.1145/3243734.3243868
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Oblivious linear-function evaluation (OLE) is a secure two-party protocol allowing a receiver to learn any linear combination of a pair of field elements held by a sender. OLE serves as a common building block for secure computation of arithmetic circuits, analogously to the role of oblivious transfer (OT) for boolean circuits. A useful extension of OLE is vector OLE (VOLE), allowing the receiver to learn any linear combination of two vectors held by the sender. In several applications of OLE, one can replace a large number of instances of OLE by a smaller number of long instances of VOLE. This motivates the goal of amortizing the cost of generating long instances of VOLE. We suggest a newapproach for fast generation of pseudo-random instances of VOLE via a deterministic local expansion of a pair of short correlated seeds and no interaction. This provides the first example of compressing a non-trivial and cryptographically useful correlation with good concrete efficiency. Our VOLE generators can be used to enhance the efficiency of a host of cryptographic applications. These include secure arithmetic computation and non-interactive zero-knowledge proofs with reusable preprocessing. Our VOLE generators are based on a novel combination of function secret sharing (FSS) for multi-point functions and linear codes in which decoding is intractable. Their security can be based on variants of the learning parity with noise (LPN) assumption over large fields that resist known attacks. We provide several constructions that offer tradeoffs between different efficiency measures and the underlying intractability assumptions.
引用
收藏
页码:896 / 912
页数:17
相关论文
共 80 条
[1]   Efficient Encryption From Random Quasi-Cyclic Codes [J].
Aguilar-Melchor, Carlos ;
Blazy, Olivier ;
Deneuville, Jean-Christophe ;
Gaborit, Philippe ;
Zemor, Gilles .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (05) :3927-3943
[2]   Ciphers for MPC and FHE [J].
Albrecht, Martin R. ;
Rechberger, Christian ;
Schneider, Thomas ;
Tiessen, Tyge ;
Zohner, Michael .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :430-454
[3]   More on average case vs approximation complexity [J].
Alekhnovich, M .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :298-307
[4]  
[Anonymous], 2014, P 5 INN THEOR COMP S
[5]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[6]   Secure Arithmetic Computation with Constant Computational Overhead [J].
Applebaum, Benny ;
Damgard, Ivan ;
Ishai, Yuval ;
Nielsen, Michael ;
Zichron, Lior .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :223-254
[7]   Algebraic Attacks against Random Local Functions and Their Countermeasures [J].
Applebaum, Benny ;
Lovett, Shachar .
STOC'16: PROCEEDINGS OF THE 48TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2016, :1087-1100
[8]  
Applebaum B, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P805
[9]   How to Garble Arithmetic Circuits [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :120-129
[10]  
Arora Sanjeev, 2010, ELECT C COMPUTATIONA