### PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication

Hanyu Jia and Xiangxue Li

##### Abstract

We consider private function evaluation (PFE) in malicious adversary model. Current state-of-the-art in PFE from Valiant's universal circuits (Liu, Yu, et al., CRYPTO 2021) does not avoid the logarithmic factor in circuit size. In constructing linear active PFE, one essential building block is to prove the correctness of an extended permutation (EP, Mohassel and Sadeghian at EUROCRYPT 2013) by zero-knowledge protocols with linear complexity. The linear instantiation $\mathcal{ZK}_{EP}$ by Mohassel, Sadeghian, and Smart (ASIACRYPT 2014) is a three-phase protocol, and each phase (dummy placement, replication, and permutation) is of size $2g$. Its overhead thus seems really outrageous, reducing its practicability. We present in this paper a novel and efficient framework $\mathcal{ZK}_{DS}$ for proving the correct EP. We show that \underline{d}ouble \underline{s}huffles suffice for EP (exponentiations and communication overheads are about 27% and 31% of $\mathcal{ZK}_{EP}$, respectively). Data owner(s) generates the randomness for the first shuffle whose outputs determine outgoing wires of the circuit defined by the function. Function owner reuses and extends the randomness in the second shuffle whose outputs determine the incoming wires. From $\mathcal{ZK}_{DS}$, we build an online/offline PFE framework with linear active security. The online phase could be instantiated by any well-studied secure function evaluation (SFE) with linear active security (e.g., Tiny-OT at CRYPTO 2012). The offline phase depends only on the private function $f$ and uses $\mathcal{ZK}_{DS}$ to prove the EP relationship between outgoing wires and incoming wires in the circuit $\mathcal{C}_f$ derived from $f$.

Available format(s)
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
Private Function EvaluationActive SecurityZero-Knowledge ProofExtended PermutationShuffle.
Contact author(s)
51205902010 @ stu ecnu edu cn
History
Short URL
https://ia.cr/2022/219

CC BY

BibTeX

@misc{cryptoeprint:2022/219,
author = {Hanyu Jia and Xiangxue Li},
title = {PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication},
howpublished = {Cryptology ePrint Archive, Paper 2022/219},
year = {2022},
note = {\url{https://eprint.iacr.org/2022/219}},
url = {https://eprint.iacr.org/2022/219}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.