VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE

被引:86
作者
Rindal, Peter [1 ]
Schoppmann, Phillipp [2 ]
机构
[1] Visa Res, Palo Alto, CA 94306 USA
[2] Humboldt Univ, Berlin, Germany
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II | 2021年 / 12697卷
关键词
D O I
10.1007/978-3-030-77886-6_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we present a new construction for a batched Oblivious Pseudorandom Function (OPRF) based on Vector-OLE and the PaXoS data structure. We then use it in the standard transformation for achieving Private Set Intersection (PSI) from an OPRF. Our overall construction is highly efficient with O(n) communication and computation. We demonstrate that our protocol can achieve malicious security at only a very small overhead compared to the semi-honest variant. For input sizes n = 2(20), our malicious protocol needs 6.2 s and less than 59 MB communication. This corresponds to under 450 bits per element, which is the lowest number for any published PSI protocol (semi-honest or malicious) to date. Moreover, in theory our semi-honest (resp. malicious) protocol can achieve as low as 219 (resp. 260) bits per element for n = 2(20) at the added cost of interpolating a polynomial over n elements. As a second contribution, we present an extension where the output of the PSI is secret-shared between the two parties. This functionality is generally referred to as Circuit-PSI. It allows the parties to perform a subsequent MPC protocol on the secret-shared outputs, e.g., train a machine learning model. Our circuit PSI protocol builds on our OPRF construction along with another application of the PaXoS data structure. It achieves semi-honest security and allows for a highly efficient implementation, up to 3x faster than previous work.
引用
收藏
页码:901 / 930
页数:30
相关论文
共 38 条
[1]   Secure Arithmetic Computation with Constant Computational Overhead [J].
Applebaum, Benny ;
Damgard, Ivan ;
Ishai, Yuval ;
Nielsen, Michael ;
Zichron, Lior .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :223-254
[2]   FAST MODULAR TRANSFORMS [J].
BORODIN, A ;
MOENCK, R .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1974, 8 (03) :366-386
[3]   Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation [J].
Boyle, Elette ;
Couteau, Geoffroy ;
Gilboa, Niv ;
Ishai, Yuval ;
Kohl, Lisa ;
Rindal, Peter ;
Scholl, Peter .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :291-308
[4]   Compressing Vector OLE [J].
Boyle, Elette ;
Couteau, Geoffroy ;
Gilboa, Niv ;
Ishai, Yuval .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :896-912
[5]  
Buddhavarapu P, 2020, 2020599 CRYPT EPRINT
[6]   Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF [J].
Chase, Melissa ;
Miao, Peihan .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III, 2020, 12172 :34-63
[7]   Combining Private Set-Intersection with Secure Two-Party Computation [J].
Ciampi, Michele ;
Orlandi, Claudio .
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 :464-482
[8]  
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6477, P213, DOI 10.1007/978-3-642-17373-8_13
[9]  
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13
[10]  
Demmler Daniel, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P159, DOI 10.1515/popets-2018-0037