PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication

  • Hanyu Jia
  • , Xiangxue Li*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We consider the private function evaluation (PFE) problem in the malicious adversary model. Current state-of-the-art in PFE based on Valiant’s universal circuits (Liu, Yu, etc., CRYPTO 2021) seems to reach a theoretical optimum (13g·logg) (g is the number of the gates in the circuit), but still does not avoid the logarithmic factor in circuit size. In constructing PFE with linear active security, one essential building block is to prove the correctness of an extended permutation (EP, Mohassel and Sadeghian at EUROCRYPT 2013) by a zero-knowledge (ZK) protocol with linear complexity. Mohassel, Sadeghian, and Smart (ASIACRYPT 2014) presented a three-phase instantiation ZKEP, which is supposed to validate that the function owner has done his local computation in the right way. In particular, ZKEP consists of a dummy placement phase, a replication phase, and a permutation phase, and each of the phases is of size 2g. The overhead required by ZKEP thus seems really heavy, reducing its practicability. We present in this paper a novel and efficient framework ZKDS for proving the correct EP. We show that double shuffles (DS) suffice in ZKDS: one shuffle is of size u+g-o (u is the number of input wires in the circuit and o the number of output wires, and we have generally g≫u,u≈o), another is of size 2g, and no replication phase is required. The verifier generates the randomness for the first shuffle whose outputs determine the outgoing wires. The second shuffle reuses and extends the randomness and determines the incoming wires. Besides its linear complexity and succinct double-shuffle structure, ZKDS reduces the communication overhead by more than 50% (including the ciphertexts and corresponding proofs), compared to ZKEP. From ZKDS, we can build an actively secure online/offline PFE framework with linear complexity. The online phase could be instantiated by any well-studied secure function evaluation (SFE) with linear active security (e.g., Tiny-OT at CRYPTO 2012). The offline phase depends only on the function and uses ZKDS to prove the EP relationship between u+g-o outgoing wires and 2g incoming wires in the topological circuit Cf derived from the private function f. The design pushes actively secure PFE to be more compact in practice.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - 19th International Conference, Inscrypt 2023, Revised Selected Papers
EditorsChunpeng Ge, Moti Yung
PublisherSpringer Science and Business Media Deutschland GmbH
Pages227-252
Number of pages26
ISBN (Print)9789819709410
DOIs
StatePublished - 2024
Event19th International Conference on Information Security and Cryptology, Inscrypt 2023 - Hangzhou, China
Duration: 9 Dec 202310 Dec 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14526 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Conference on Information Security and Cryptology, Inscrypt 2023
Country/TerritoryChina
CityHangzhou
Period9/12/2310/12/23

Keywords

  • Active Security
  • Extended Permutation
  • Private Function Evaluation
  • Shuffle
  • Zero-Knowledge Proof

Fingerprint

Dive into the research topics of 'PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication'. Together they form a unique fingerprint.

Cite this