Function Secret Sharing

被引:220
作者
Boyle, Elette [1 ]
Gilboa, Niv [2 ]
Ishai, Yuval [1 ]
机构
[1] Technion Israel Inst Technol, Comp Sci, Haifa, Israel
[2] Ben Gurion Univ Negev, Dept Commun Syst Engn, Beer Sheva, Israel
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II | 2015年 / 9057卷
关键词
PRIVATE INFORMATION-RETRIEVAL; LOCALLY DECODABLE CODES;
D O I
10.1007/978-3-662-46803-6_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by the goal of securely searching and updating distributed data, we introduce and study the notion of function secret sharing (FSS). This new notion is a natural generalization of distributed point functions (DPF), a primitive that was recently introduced by Gilboa and Ishai (Eurocrypt 2014). Given a positive integer p >= 2 and a class F of functions f : {0, 1}(n) -> G, where G is an Abelian group, a p-party FSS scheme for F allows one to split each f is an element of F into p succinctly described functions f(i) : {0, 1}(n). G -> 1 <= i <= p, such that: (1) Sigma(p)(i=1) f(i) = f, and (2) any strict subset of the f(i) hides f. Thus, an FSS for F can be thought of as method for succinctly performing an "additive secret sharing" of functions from F. The original definition of DPF coincides with a two-party FSS for the class of point functions, namely the class of functions that have a nonzero output on at most one input. We present two types of results. First, we obtain efficiency improvements and extensions of the original DPF construction. Then, we initiate a systematic study of general FSS, providing some constructions and establishing relations with other cryptographic primitives. More concretely, we obtain the following main results: - IMPROVED DPF. We present an improved (two-party) DPF construction from a pseudorandom generator (PRG), reducing the length of the key describing each f(i) from O(lambda.n(log23)) to O(lambda n), where lambda is the PRG seed length. - MULTI-PARTY DPF. We present the first nontrivial construction of a p-party DPF for p >= 3, obtaining a near-quadratic improvement over a naive construction that additively shares the truth-table of f. This constrcution too can be based on any PRG. - FSS for simple functions. We present efficient PRG-based FSS constructions for natural function classes that extend point functions, including interval functions and partial matching functions. - A study of general FSS. We show several relations between general FSS and other cryptographic primitives. These include a construction of general FSS via obfuscation, an indication for the implausibility of constructing general FSS from weak cryptographic assumptions such as the existence of one-way functions, a completeness result, and a relation with pseudorandom functions.
引用
收藏
页码:337 / 367
页数:31
相关论文
共 47 条
[1]  
[Anonymous], 2014882 CRYPT EPRINT
[2]  
[Anonymous], 2000, Foundations of Cryptography: Basic Tools
[3]  
[Anonymous], 1997, STOC
[4]  
[Anonymous], EL C COMP COMPL ECCC
[5]  
[Anonymous], EL C COMP COMPL ECCC
[6]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[7]  
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[8]   On the (Im)possibility of Obfuscating Programs [J].
Barak, Boaz ;
Goldreich, Oded ;
Impagliazzo, Russell ;
Rudich, Steven ;
Sahai, Amit ;
Vadhan, Salil ;
Yang, Ke .
JOURNAL OF THE ACM, 2012, 59 (02)
[9]   On Locally Decodable Codes, Self-Correctable Codes, and t-Private PIR [J].
Barkol, Omer ;
Ishai, Yuval ;
Weinreb, Enav .
ALGORITHMICA, 2010, 58 (04) :831-859
[10]   A tight lower bound for restricted pir protocols [J].
Beigel, R ;
Fortnow, L ;
Gasarch, W .
COMPUTATIONAL COMPLEXITY, 2006, 15 (01) :82-91