Paper 2024/789
Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF
Abstract
Circuit Private Set Intersection (Circuit-PSI) allows two parties to compute a function $f$ on items in the intersection of their input sets without revealing items in the intersection set. It is a well-known variant of PSI and has numerous practical applications. However, existing Circuit-PSI protocols only provide security against \textit{semi-honest} adversaries. A straightforward approach to constructing a maliciously secure Circuit-PSI is to extend a pure garbled-circuit-based PSI (NDSS'12 \cite{huang2012private}) to a maliciously secure circuit-PSI, but it will not be concretely efficient. Another is converting state-of-the-art semi-honest Circuit-PSI protocols (EUROCRYPT'21 \cite{rindal2021vole}; PoPETS'22 \cite{chandran2022circuit}) to be secure in the malicious setting. However, it will come across \textit{the consistency issue} (EUROCRYPT'11 \cite{shelat2011two}) since parties can not guarantee the inputs of the function $f$ stay unchanged as obtained from the last step. This paper tackles the previously mentioned issue by presenting the first maliciously secure Circuit-PSI protocol. Our key innovation, the Distributed Dual-key Oblivious Pseudorandom Function (DDOPRF), enables the oblivious evaluation of secret-shared inputs using dual keys within the SPDZ MPC framework. Notably, this construction seamlessly ensures fairness within the Circuit-PSI. Compared to the state-of-the-art semi-honest Circuit-PSI protocol (PoPETS'22), experimental results demonstrate that our malicious Circuit-PSI protocol not only reduces around $5$x communication costs but also enhances efficiency, particularly for modest input sets ($\le 2^{14}$) in the case of the WAN setting with high latency and limited bandwidth.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Minor revision. PoPETs 2025
- Keywords
- private set intersectionSPDZsecret sharingsecure multiparty computationcircuit PSI
- Contact author(s)
-
yxyangjnu @ gmail com
im liangxj @ gmail com
songxf @ comp nus edu sg
ye_dong @ sutd edu sg
changyu dong @ gmail com
jianying_zhou @ sutd edu sg - History
- 2024-12-01: last of 4 revisions
- 2024-05-22: received
- See all versions
- Short URL
- https://ia.cr/2024/789
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/789, author = {Yaxi Yang and Xiaojian Liang and Xiangfu Song and Ye Dong and Linting Huang and Hongyu Ren and Changyu Dong and Jianying Zhou}, title = {Maliciously Secure Circuit Private Set Intersection via {SPDZ}-Compatible Oblivious {PRF}}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/789}, year = {2024}, url = {https://eprint.iacr.org/2024/789} }