Paper 2023/514

Black-Box Reusable NISC with Random Oracles

Yuval Ishai, Technion – Israel Institute of Technology
Dakshita Khurana, University of Illinois Urbana-Champaign
Amit Sahai, University of California, Los Angeles
Akshayaram Srinivasan, Tata Institute of Fundamental Research
Abstract

We revisit the problem of {\em reusable} non-interactive secure computation (NISC). A standard NISC protocol for a sender-receiver functionality $f$ enables the receiver to encrypt its input $x$ such that any sender, on input $y$, can send back a message revealing only $f(x,y)$. Security should hold even when either party can be malicious. A {\em reusable} NISC protocol has the additional feature that the receiver's message can be safely reused for computing multiple outputs $f(x,y_i)$. Here security should hold even when a malicious sender can learn partial information about the honest receiver's outputs in each session. We present the first reusable NISC protocol for general functions $f$ that only makes a {\em black-box} use of any two-message oblivious transfer protocol, along with a random oracle. All previous reusable NISC protocols either made a non-black-box use of cryptographic primitives (Cachin et al., ICALP 2002) or alternatively required a stronger arithmetic variant of oblivious transfer and were restricted to $f$ in $\mathsf{NC}^1$ or similar classes (Chase et al., Crypto 2019). Our result is obtained via a general compiler from standard NISC to reusable NISC that makes use of special type of honest-majority protocols for secure multiparty computation. Finally, we extend the above main result to reusable {\em two-sided} NISC, in which two parties can encrypt their inputs in the first round and then reveal different functions of their inputs in multiple sessions. This extension either requires an additional (black-box) use of additively homomorphic commitment or alternatively requires the parties to maintain a state between sessions.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in EUROCRYPT 2023
Keywords
NISCRandom OraclesBlack-Box
Contact author(s)
yuvali @ cs technion ac il
dakshita @ illinois edu
sahai @ cs ucla edu
akshayaram @ berkeley edu
History
2023-04-10: approved
2023-04-10: received
See all versions
Short URL
https://ia.cr/2023/514
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/514,
      author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan},
      title = {Black-Box Reusable NISC with Random Oracles},
      howpublished = {Cryptology ePrint Archive, Paper 2023/514},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/514}},
      url = {https://eprint.iacr.org/2023/514}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.