Paper 2024/375
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
Abstract
Motivated by secure database search, we present secure computation protocols for a function $f$ in the client-servers setting, where a client can obtain $f(x)$ on a private input $x$ by communicating with multiple servers each holding $f$. Specifically, we propose generic compilers from passively secure protocols, which only keep security against servers following the protocols, to actively secure protocols, which guarantee privacy and correctness even against malicious servers. Our compilers are applied to protocols computing any class of functions, and are efficient in that the overheads in communication and computational complexity are only polynomial in the number of servers, independent of the complexity of functions. We then apply our compilers to obtain concrete actively secure protocols for various functions including private information retrieval (PIR), bounded-degree multivariate polynomials and constant-depth circuits. For example, our actively secure PIR protocols achieve exponentially better computational complexity in the number of servers than the currently best-known protocols. Furthermore, our protocols for polynomials and constant-depth circuits reduce the required number of servers compared to the previous actively secure protocols. In particular, our protocol instantiated from the sparse Learning Parity with Noise (LPN) assumption is the first actively secure protocol for multivariate polynomials which has the minimum number of servers, without assuming fully homomorphic encryption.
Note: A preliminary version of the paper has previously appeared in a preprint by the same authors (ePrint report 2023/210). The current version generalizes part of the techniques and presents more formal security proofs.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- A major revision of an IACR publication in EUROCRYPT 2024
- Keywords
- private information retrievalsecure computation
- Contact author(s)
-
eriguchi-reo @ aist go jp
kaoru kurosawa kk @ vc ibaraki ac jp
nuida @ imi kyushu-u ac jp - History
- 2024-03-01: approved
- 2024-02-29: received
- See all versions
- Short URL
- https://ia.cr/2024/375
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/375, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, title = {Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/375}, year = {2024}, url = {https://eprint.iacr.org/2024/375} }