Paper 2025/605

Laconic Cryptography with Preprocessing

Rishabh Bhadauria
Nico Döttling, Helmholtz Center for Information Security
Carmit Hazay, Bar-Ilan University
Chuanwei Lin, Helmholtz Center for Information Security
Abstract

Laconic cryptography focuses on designing two-message protocols that allow secure computation on large datasets while minimizing communication costs. While laconic cryptography protocols achieve asymptotically optimal communication complexity for many tasks, their concrete efficiency is prohibitively expensive due to the heavy use of public-key techniques or the non-black-box of cryptographic primitives. In this work, we initiate the study of "laconic cryptography with preprocessing", introducing a model that includes an offline phase to generate database-dependent correlations, which are then used in a lightweight online phase. These correlations are conceptually simple, relying on linear-algebraic techniques. This enables us to develop a protocol for private laconic vector oblivious linear evaluation (plvOLE). In such a protocol, the receiver holds a large database , and the sender has two messages and , along with an index . The receiver learns the value without revealing other information. Our protocol, which draws from ideas developed in the context of private information retrieval with preprocessing, serves as the backbone for two applications of interest: laconic private set intersection (lPSI) for large universes and laconic function evaluation for RAM-programs (RAM-LFE). Based our plvOLE protocol, we provide efficient instantiations of these two primitives in the preprocessing model.

Note: This work replaces https://eprint.iacr.org/2024/1555. This is a repost, as the techniques in this work have substantially changed.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Laconic CryptographyLaconic VOLELaconic PSI
Contact author(s)
rishabh bhadauria @ gmail com
nico doettling @ gmail com
carmit hazay @ biu ac il
chuanwei lin @ cispa de
History
2025-04-08: approved
2025-04-03: received
See all versions
Short URL
https://ia.cr/2025/605
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/605,
      author = {Rishabh Bhadauria and Nico Döttling and Carmit Hazay and Chuanwei Lin},
      title = {Laconic Cryptography with Preprocessing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/605},
      year = {2025},
      url = {https://eprint.iacr.org/2025/605}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.