Paper 2024/789

Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF

Yaxi Yang, Singapore University of Technology and Design
Xiaojian Liang, Independent Researcher
Xiangfu Song, National University of Singapore
Linting Huang, Guangzhou University
Hongyu Ren, Guangzhou University
Changyu Dong, Guangzhou University
Jianying Zhou, Singapore University of Technology and Design
Abstract

Circuit Private Set Intersection (Circuit-PSI) allows two parties to compute any functionality $f$ on items in the intersection of their input sets without revealing any information about the intersection set. It is a well-known variant of PSI and has numerous practical applications. However, existing circuit-PSI protocols only provide security against \textit{semi-honest} adversaries. One straightforward solution is to extend a pure garbled-circuit-based PSI (NDSS'12) to a maliciously secure circuit-PSI, but it will result in non-concrete complexity. Another is converting state-of-the-art semi-honest circuit-PSI protocols (EUROCRYPT'21; PoPETS'22) to be secure in the malicious setting. However, it will come across \textit{the consistency issue} since parties can not guarantee the inputs of functionality $f$ stay unchanged as obtained from the last step. This paper addresses the aforementioned issue by introducing the first maliciously secure circuit-PSI protocol. The central building block named Distributed Dual-key Oblivious PRF (DDOPRF), provides an oblivious evaluation of secret-shared inputs with dual keys. Additionally, we ensure the compatibility of DDOPRF with SPDZ, enhancing the versatility of our circuit-PSI protocol. Notably, our construction allows us to guarantee fairness within circuit-PSI effortlessly. Importantly, our circuit-PSI protocol also achieves online linear computation and communication complexities.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
private set intersectionSPDZsecret sharingsecure multiparty computationcircuit PSI
Contact author(s)
yxyangjnu @ gmail com
im liangxj @ gmail com
songxf @ comp nus edu sg
changyu dong @ gmail com
jianying_zhou @ sutd edu sg
History
2024-06-02: last of 3 revisions
2024-05-22: received
See all versions
Short URL
https://ia.cr/2024/789
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/789,
      author = {Yaxi Yang and Xiaojian Liang and Xiangfu Song and Linting Huang and Hongyu Ren and Changyu Dong and Jianying Zhou},
      title = {Maliciously Secure Circuit-{PSI} via {SPDZ}-Compatible Oblivious {PRF}},
      howpublished = {Cryptology ePrint Archive, Paper 2024/789},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/789}},
      url = {https://eprint.iacr.org/2024/789}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.