VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE

被引:69
作者
Rindal, Peter [1 ]
Schoppmann, Phillipp [2 ]
机构
[1] Visa Res, Palo Alto, CA 94306 USA
[2] Humboldt Univ, Berlin, Germany
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II | 2021年 / 12697卷
关键词
D O I
10.1007/978-3-030-77886-6_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we present a new construction for a batched Oblivious Pseudorandom Function (OPRF) based on Vector-OLE and the PaXoS data structure. We then use it in the standard transformation for achieving Private Set Intersection (PSI) from an OPRF. Our overall construction is highly efficient with O(n) communication and computation. We demonstrate that our protocol can achieve malicious security at only a very small overhead compared to the semi-honest variant. For input sizes n = 2(20), our malicious protocol needs 6.2 s and less than 59 MB communication. This corresponds to under 450 bits per element, which is the lowest number for any published PSI protocol (semi-honest or malicious) to date. Moreover, in theory our semi-honest (resp. malicious) protocol can achieve as low as 219 (resp. 260) bits per element for n = 2(20) at the added cost of interpolating a polynomial over n elements. As a second contribution, we present an extension where the output of the PSI is secret-shared between the two parties. This functionality is generally referred to as Circuit-PSI. It allows the parties to perform a subsequent MPC protocol on the secret-shared outputs, e.g., train a machine learning model. Our circuit PSI protocol builds on our OPRF construction along with another application of the PaXoS data structure. It achieves semi-honest security and allows for a highly efficient implementation, up to 3x faster than previous work.
引用
收藏
页码:901 / 930
页数:30
相关论文
共 38 条
  • [1] Secure Arithmetic Computation with Constant Computational Overhead
    Applebaum, Benny
    Damgard, Ivan
    Ishai, Yuval
    Nielsen, Michael
    Zichron, Lior
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 223 - 254
  • [2] FAST MODULAR TRANSFORMS
    BORODIN, A
    MOENCK, R
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1974, 8 (03) : 366 - 386
  • [3] Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
    Boyle, Elette
    Couteau, Geoffroy
    Gilboa, Niv
    Ishai, Yuval
    Kohl, Lisa
    Rindal, Peter
    Scholl, Peter
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 291 - 308
  • [4] Compressing Vector OLE
    Boyle, Elette
    Couteau, Geoffroy
    Gilboa, Niv
    Ishai, Yuval
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 896 - 912
  • [5] Buddhavarapu P., 2020, Report 2020/599, V2020, P599
  • [6] Chase Melissa, 2020, Advances in Cryptology - CRYPTO 2020. 40th Annual International Cryptology Conference, CRYPTO 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12172), P34, DOI 10.1007/978-3-030-56877-1_2
  • [7] Chen Y H, 2012, NDSS, P23
  • [8] Combining Private Set-Intersection with Secure Two-Party Computation
    Ciampi, Michele
    Orlandi, Claudio
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 464 - 482
  • [9] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
  • [10] De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13