In this work we study whether a trusted setup or a random oracle are necessary for protocols with minimal interaction that meet the optimal communication and computation bounds in the query phase. We answer this question positively and demonstrate a lower bound on the communication or the computational overhead in this phase. We further abstract the security properties of the underlying cryptographic primitive that imply private outsourced database search with minimal interaction. For a large class of search functionalities the communication complexity of our protocol meets our lower bound.
Category / Keywords: cryptographic protocols / Outsourced Computation, Database Search Functionalities, Lower Bound, Communication and Computational Complexities, Minimal Interaction Date: received 8 Sep 2014, last revised 22 Feb 2015 Contact author: carmit hazay at biu ac il Available format(s): PDF | BibTeX Citation Version: 20150222:070111 (All versions of this report) Short URL: ia.cr/2014/706 Discussion forum: Show discussion | Start new discussion