Abstract
In this paper, we study the two fundamental functionalities oblivious polynomial evaluation in the exponent and set-intersection and introduce a new technique for designing efficient secure protocols for these problems (and others). Our starting point is the technique (Benabbas et al. in CRYPTO, 2011) for verifiable delegation of polynomial evaluations, using algebraic PRFs. We use this tool, that is useful to achieve verifiability in the outsourced setting, in order to achieve privacy in the standard two-party setting. Our results imply new simple and efficient oblivious polynomial evaluation (OPE) protocols. We further show that our OPE protocols are readily used for secure set-intersection, implying much simpler protocols in the plain model. As a side result, we demonstrate the usefulness of algebraic PRFs for various search functionalities, such as keyword search and oblivious transfer with adaptive queries. Our protocols are secure under full simulation-based definitions in the presence of malicious adversaries.
Original language | English |
---|---|
Pages (from-to) | 537-586 |
Number of pages | 50 |
Journal | Journal of Cryptology |
Volume | 31 |
Issue number | 2 |
DOIs | |
State | Published - 1 Apr 2018 |
Bibliographical note
Publisher Copyright:© 2017, International Association for Cryptologic Research.
Funding
∗A preliminary version of this paper appeared in the proceedings of TCC 2015 [27]. †Research partially supported by a grant from the Israel Ministry of Science and Technology (Grant No. 3-10883). © International Association for Cryptologic Research 2017
Funders | Funder number |
---|---|
Ministry of science and technology, Israel | 3-10883 |
Keywords
- Committed oblivious PRF
- Efficient secure computation
- Oblivious polynomial evaluation
- Secure set-intersection