Oblivious Key-Value Stores and Amplification for Private Set Intersection

被引:61
|
作者
Garimella, Gayathri [1 ]
Pinkas, Benny [2 ]
Rosulek, Mike [1 ]
Ni Trieu [3 ]
Yanai, Avishay [4 ]
机构
[1] Oregon State Univ, Corvallis, OR 97331 USA
[2] Bar Ilan Univ, Ramat Gan, Israel
[3] Arizona State Univ, Tempe, AZ USA
[4] VMware Res, Palo Alto, CA USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II | 2021年 / 12826卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-84245-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We consider the more general notion of an oblivious key-value store (OKVS), which is a data structure that compactly represents a desired mapping k(i) -> v(i). When the v(i) values are random, the OKVS data structure hides the k(i) values that were used to generate it. The simplest (and size-optimal) OKVS is a polynomial p that is chosen using interpolation such that p(k(i)) = v(i). We initiate the formal study of oblivious key-value stores, and show new constructions resulting in the fastest OKVS to date. Similarly to cuckoo hashing, current analysis techniques are insufficient for finding concrete parameters to guarantee a small failure probability for our OKVS constructions. Moreover, it would cost too much to run experiments to validate a small upperbound on the failure probability. We therefore show novel techniques to amplify an OKVS construction which has a failure probability p, to an OKVS with a similar overhead and failure probability p(c). Setting p to be moderately small enables to validate it by running a relatively small number of O(1/p) experiments. This validates a p(c) failure probability for the amplified OKVS. Finally, we describe how OKVS can significantly improve the state of the art of essentially all variants of PSI. This leads to the fastest two-party PSI protocols to date, for both the semi-honest and the malicious settings. Specifically, in networks with moderate bandwidth (e.g., 30-300 Mbps) our malicious two-party PSI protocol has 40% less communication and is 20-40% faster than the previous state of the art protocol, even though the latter only has heuristic confidence.
引用
收藏
页码:395 / 425
页数:31
相关论文
共 50 条
  • [41] An adaptive replica placement approach for distributed key-value stores
    Costa Filho, Jose S.
    Cavalcante, Denis M.
    Moreira, Leonardo O.
    Machado, Javam C.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (11):
  • [42] Chapar: Certified Causally Consistent Distributed Key-Value Stores
    Lesani, Mohsen
    Bell, Christian J.
    Chlipala, Adam
    ACM SIGPLAN NOTICES, 2016, 51 (01) : 357 - 370
  • [43] Chisel: Reshaping Queries to Trim Latency in Key-Value Stores
    Birke, Robert
    Perez, Juan E.
    Ben Mokhtar, Sonia
    Rameshan, Navaneeth
    Chen, Lydia Y.
    2019 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC 2019), 2019, : 42 - 51
  • [44] Compressed Incremental Checkpointing for Efficient Replicated Key-Value Stores
    Guler, Berkin
    Ozkasap, Oznur
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 76 - 81
  • [46] Understanding and improvement of the selection of replica servers in key-value stores
    Jiang, Wanchun
    Xie, Haiming
    Zhou, Xiangqian
    Fang, Liyuan
    Wang, Jianxin
    INFORMATION SYSTEMS, 2019, 83 : 218 - 228
  • [47] BigSecret: A Secure Data Management Framework for Key-Value Stores
    Pattuk, Erman
    Kantarcioglu, Murat
    Khadilkar, Vaibhav
    Ulusoy, Huseyin
    Mehrotra, Sharad
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 147 - 154
  • [48] Enabling Low Tail Latency on Multicore Key-Value Stores
    Lersch, Lucas
    Schreter, Ivan
    Oukid, Ismail
    Lehner, Wolfgang
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (07): : 1091 - 1104
  • [49] Consistent Low Latency Scheduler for Distributed Key-Value Stores
    Jiang, Wanchun
    Li, Haoyang
    Yan, Yulong
    Ji, Fa
    Huang, Jiawei
    Wang, Jianxin
    Zhang, Tong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (12) : 3012 - 3027
  • [50] A Novel Design to Support Skyline Query In Key-Value Stores
    Chang, Che-Wei
    Chu, Cheng-Lung
    Chao, Yu-Chang
    2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 813 - 818