Paper 2022/219
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
Hanyu Jia and Xiangxue Li
Abstract
We consider private function evaluation (PFE) in malicious adversary model. Current state-of-the-art in PFE from Valiant's universal circuits (Liu, Yu, et al., CRYPTO 2021) does not avoid the logarithmic factor in circuit size. In constructing linear active PFE, one essential building block is to prove the correctness of an extended permutation (EP, Mohassel and Sadeghian at EUROCRYPT 2013) by zero-knowledge protocols with linear complexity. The linear instantiation
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Preprint. MINOR revision.
- Keywords
- Private Function EvaluationActive SecurityZero-Knowledge ProofExtended PermutationShuffle.
- Contact author(s)
- 51205902010 @ stu ecnu edu cn
- History
- 2022-02-25: received
- Short URL
- https://ia.cr/2022/219
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/219, author = {Hanyu Jia and Xiangxue Li}, title = {{PFE}: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/219}, year = {2022}, url = {https://eprint.iacr.org/2022/219} }