Paper 2024/789

Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF

Yaxi Yang, Singapore University of Technology and Design
Xiaojian Liang, Independent Researcher
Xiangfu Song, National University of Singapore
Ye Dong, Singapore University of Technology and Design
Linting Huang, Guangzhou University
Hongyu Ren, Guangzhou University
Changyu Dong, Guangzhou University
Jianying Zhou, Singapore University of Technology and Design
Abstract

Circuit Private Set Intersection (Circuit-PSI) allows two parties to compute a function $f$ on items in the intersection of their input sets without revealing items in the intersection set. It is a well-known variant of PSI and has numerous practical applications. However, existing Circuit-PSI protocols only provide security against \textit{semi-honest} adversaries. A straightforward approach to constructing a maliciously secure Circuit-PSI is to extend a pure garbled-circuit-based PSI (NDSS'12 \cite{huang2012private}) to a maliciously secure circuit-PSI, but it will not be concretely efficient. Another is converting state-of-the-art semi-honest Circuit-PSI protocols (EUROCRYPT'21 \cite{rindal2021vole}; PoPETS'22 \cite{chandran2022circuit}) to be secure in the malicious setting. However, it will come across \textit{the consistency issue} (EUROCRYPT'11 \cite{shelat2011two}) since parties can not guarantee the inputs of the function $f$ stay unchanged as obtained from the last step. This paper tackles the previously mentioned issue by presenting the first maliciously secure Circuit-PSI protocol. Our key innovation, the Distributed Dual-key Oblivious Pseudorandom Function (DDOPRF), enables the oblivious evaluation of secret-shared inputs using dual keys within the SPDZ MPC framework. Notably, this construction seamlessly ensures fairness within the Circuit-PSI. Compared to the state-of-the-art semi-honest Circuit-PSI protocol (PoPETS'22), experimental results demonstrate that our malicious Circuit-PSI protocol not only reduces around $5$x communication costs but also enhances efficiency, particularly for modest input sets ($\le 2^{14}$) in the case of the WAN setting with high latency and limited bandwidth.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. PoPETs 2025
Keywords
private set intersectionSPDZsecret sharingsecure multiparty computationcircuit PSI
Contact author(s)
yxyangjnu @ gmail com
im liangxj @ gmail com
songxf @ comp nus edu sg
ye_dong @ sutd edu sg
changyu dong @ gmail com
jianying_zhou @ sutd edu sg
History
2024-12-01: last of 4 revisions
2024-05-22: received
See all versions
Short URL
https://ia.cr/2024/789
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/789,
      author = {Yaxi Yang and Xiaojian Liang and Xiangfu Song and Ye Dong and Linting Huang and Hongyu Ren and Changyu Dong and Jianying Zhou},
      title = {Maliciously Secure Circuit Private Set Intersection via {SPDZ}-Compatible Oblivious {PRF}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/789},
      year = {2024},
      url = {https://eprint.iacr.org/2024/789}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.