Oblivious Key-Value Stores and Amplification for Private Set Intersection

被引:61
|
作者
Garimella, Gayathri [1 ]
Pinkas, Benny [2 ]
Rosulek, Mike [1 ]
Ni Trieu [3 ]
Yanai, Avishay [4 ]
机构
[1] Oregon State Univ, Corvallis, OR 97331 USA
[2] Bar Ilan Univ, Ramat Gan, Israel
[3] Arizona State Univ, Tempe, AZ USA
[4] VMware Res, Palo Alto, CA USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II | 2021年 / 12826卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-84245-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We consider the more general notion of an oblivious key-value store (OKVS), which is a data structure that compactly represents a desired mapping k(i) -> v(i). When the v(i) values are random, the OKVS data structure hides the k(i) values that were used to generate it. The simplest (and size-optimal) OKVS is a polynomial p that is chosen using interpolation such that p(k(i)) = v(i). We initiate the formal study of oblivious key-value stores, and show new constructions resulting in the fastest OKVS to date. Similarly to cuckoo hashing, current analysis techniques are insufficient for finding concrete parameters to guarantee a small failure probability for our OKVS constructions. Moreover, it would cost too much to run experiments to validate a small upperbound on the failure probability. We therefore show novel techniques to amplify an OKVS construction which has a failure probability p, to an OKVS with a similar overhead and failure probability p(c). Setting p to be moderately small enables to validate it by running a relatively small number of O(1/p) experiments. This validates a p(c) failure probability for the amplified OKVS. Finally, we describe how OKVS can significantly improve the state of the art of essentially all variants of PSI. This leads to the fastest two-party PSI protocols to date, for both the semi-honest and the malicious settings. Specifically, in networks with moderate bandwidth (e.g., 30-300 Mbps) our malicious two-party PSI protocol has 40% less communication and is 20-40% faster than the previous state of the art protocol, even though the latter only has heuristic confidence.
引用
收藏
页码:395 / 425
页数:31
相关论文
共 50 条
  • [21] Evaluation of Key-Value Stores for Distributed Locking Purposes
    Grzesik, Piotr
    Mrozek, Dariusz
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES (BDAS): PAVING THE ROAD TO SMART DATA PROCESSING AND ANALYSIS, 2019, 1018 : 70 - 81
  • [22] Exploiting key-value data stores scalability for HPC
    Cugnasco, Cesare
    Becerra, Yolanda
    Torres, Jordi
    Ayguade, Eduard
    2017 46TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS (ICPPW), 2017, : 85 - 94
  • [23] Customizable Scale-Out Key-Value Stores
    Anwar, Ali
    Cheng, Yue
    Huang, Hai
    Han, Jingoo
    Sim, Hyogi
    Lee, Dongyoon
    Douglis, Fred
    Butt, Ali R.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (09) : 2081 - 2096
  • [24] Tee-based key-value stores: a survey
    Ait Messaoud, Aghiles
    Ben Mokhtar, Sonia
    Simonet-Boulogne, Anthony
    VLDB JOURNAL, 2025, 34 (01):
  • [25] Coupling Decentralized Key-Value Stores with Erasure Coding
    Cheng, Liangfeng
    Hu, Yuchong
    Lee, Patrick P. C.
    PROCEEDINGS OF THE 2019 TENTH ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '19), 2019, : 377 - 389
  • [26] SFM: Mitigating Read/Write Amplification Problem of LSM-Tree-Based Key-Value Stores
    Lee, Hoyoung
    Lee, Minho
    Eom, Young Ik
    IEEE ACCESS, 2021, 9 : 103153 - 103166
  • [27] Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval
    Hao, Meng
    Liu, Weiran
    Peng, Liqiang
    Li, Hongwei
    Zhang, Cong
    Chen, Hanxiao
    Zhang, Tianwei
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 6435 - 6451
  • [28] Taming Tail Latency in Key-Value Stores: A Scheduling Perspective
    Ben Mokhtar, Sonia
    Canon, Louis-Claude
    Dugois, Anthony
    Marchal, Loris
    Riviere, Etienne
    EURO-PAR 2021: PARALLEL PROCESSING, 2021, 12820 : 136 - 150
  • [29] Totally Ordered Replication for Massive Scale Key-Value Stores
    Ribeiro, Jose
    Machado, Nuno
    Maia, Francisco
    Matos, Miguel
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS (DAIS 2018), 2018, 10853 : 58 - 74
  • [30] Enabling Encrypted Rich Queries in Distributed Key-Value Stores
    Guo, Yu
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Li, Baochun
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (06) : 1283 - 1297