Paper 2021/1682

Making Private Function Evaluation Safer, Faster, and Simpler

Yi Liu, Qi Wang, and Siu-Ming Yiu

Abstract

In the problem of two-party \emph{private function evaluation} (PFE), one party PA holds a \emph{private function} f and (optionally) a private input xA, while the other party PB possesses a private input xB. Their goal is to evaluate f on xA and xB, and one or both parties may obtain the evaluation result f(xA,xB) while no other information beyond f(xA,xB) is revealed. In this paper, we revisit the two-party PFE problem and provide several enhancements. We propose the \emph{first} constant-round actively secure PFE protocol with linear complexity. Based on this result, we further provide the \emph{first} constant-round publicly verifiable covertly (PVC) secure PFE protocol with linear complexity to gain better efficiency. For instance, when the deterrence factor is , compared to the passively secure protocol, its communication cost is very close and its computation cost is around . In our constructions, as a by-product, we design a specific protocol for proving that a list of ElGamal ciphertexts is derived from an \emph{extended permutation} performed on a given list of elements. It should be noted that this protocol greatly improves the previous result and may be of independent interest. In addition, a reusability property is added to our two PFE protocols. Namely, if the same function is involved in multiple executions of the protocol between and , then the protocol could be executed more efficiently from the second execution. Moreover, we further extend this property to be \emph{global}, such that it supports multiple executions for the same in a reusable fashion between and \emph{arbitrary} parties playing the role of .

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in PKC 2022
Keywords
Extended permutationPrivate function evaluationPublicly verifiable covert securitySecure two-party computation
Contact author(s)
liuy7 @ mail sustech edu cn
History
2021-12-24: revised
2021-12-22: received
See all versions
Short URL
https://ia.cr/2021/1682
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1682,
      author = {Yi Liu and Qi Wang and Siu-Ming Yiu},
      title = {Making Private Function Evaluation Safer, Faster, and Simpler},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1682},
      year = {2021},
      url = {https://eprint.iacr.org/2021/1682}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.