Efficient information-theoretic distributed point functions with general output groups

IF 1.4 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS
Junru Li, Pengzhen Ke, Liang Feng Zhang
{"title":"Efficient information-theoretic distributed point functions with general output groups","authors":"Junru Li, Pengzhen Ke, Liang Feng Zhang","doi":"10.1007/s10623-024-01562-z","DOIUrl":null,"url":null,"abstract":"<p>An <i>n</i>-server information-theoretic <i>Distributed Point Function</i> (DPF) allows a client to secret-share a point function <span>\\(f_{\\alpha ,\\beta }(x)\\)</span> with domain [<i>N</i>] and output group <span>\\(\\mathbb {G}\\)</span> among <i>n</i> servers such that each server learns no information about the function from its share (called a <i>key</i>) but can compute an additive share of <span>\\(f_{\\alpha ,\\beta }(x)\\)</span> for any <i>x</i>. DPFs with small key sizes and general output groups are preferred. In this paper, we propose a new transformation from share conversions to information-theoretic DPFs. By applying it to the share conversions from Efremenko’s PIR and Dvir–Gopi PIR, we obtain both an 8-server DPF with key size <span>\\( O(2^{10\\sqrt{\\log N\\log \\log N}}+\\log p)\\)</span> and output group <span>\\(\\mathbb {Z}_p\\)</span> and a 4-server DPF with key size <span>\\(O(\\tau \\cdot 2^{6\\sqrt{\\log N\\log \\log N}})\\)</span> and output group <span>\\(\\mathbb {Z}_{2^\\tau }\\)</span>. The former allows us to partially answer an open question by Boyle, Gilboa, Ishai, and Kolobov (ITC 2022) and the latter allows us to build the first DPFs that may take any finite Abelian groups as output groups. We also discuss how to further reduce the key sizes by using different PIRs, how to reduce the number of servers by resorting to statistical security or using nice integers, and how to obtain DPFs with <i>t</i>-security. We show the applications of the new DPFs by constructing new efficient PIR protocols with result verification.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Designs, Codes and Cryptography","FirstCategoryId":"100","ListUrlMain":"https://doi.org/10.1007/s10623-024-01562-z","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

An n-server information-theoretic Distributed Point Function (DPF) allows a client to secret-share a point function \(f_{\alpha ,\beta }(x)\) with domain [N] and output group \(\mathbb {G}\) among n servers such that each server learns no information about the function from its share (called a key) but can compute an additive share of \(f_{\alpha ,\beta }(x)\) for any x. DPFs with small key sizes and general output groups are preferred. In this paper, we propose a new transformation from share conversions to information-theoretic DPFs. By applying it to the share conversions from Efremenko’s PIR and Dvir–Gopi PIR, we obtain both an 8-server DPF with key size \( O(2^{10\sqrt{\log N\log \log N}}+\log p)\) and output group \(\mathbb {Z}_p\) and a 4-server DPF with key size \(O(\tau \cdot 2^{6\sqrt{\log N\log \log N}})\) and output group \(\mathbb {Z}_{2^\tau }\). The former allows us to partially answer an open question by Boyle, Gilboa, Ishai, and Kolobov (ITC 2022) and the latter allows us to build the first DPFs that may take any finite Abelian groups as output groups. We also discuss how to further reduce the key sizes by using different PIRs, how to reduce the number of servers by resorting to statistical security or using nice integers, and how to obtain DPFs with t-security. We show the applications of the new DPFs by constructing new efficient PIR protocols with result verification.

具有一般输出群的高效信息论分布点函数
一个有N个服务器的信息论分布式点函数(DPF)允许客户端在N个服务器中秘密共享一个点函数\(f_{\alpha ,\beta }(x)\),域[N]和输出组\(\mathbb {G}\),这样每个服务器都不会从它的共享(称为密钥)中学习到关于该函数的信息,但可以为任何x计算一个附加的共享\(f_{\alpha ,\beta }(x)\)。具有小密钥大小和一般输出组的DPF是首选的。本文提出了一种从共享转换到信息论dpf的新方法。通过将其应用于Efremenko的PIR和dvr - gopi PIR的共享转换,我们获得了密钥大小为\( O(2^{10\sqrt{\log N\log \log N}}+\log p)\)和输出组\(\mathbb {Z}_p\)的8服务器DPF和密钥大小为\(O(\tau \cdot 2^{6\sqrt{\log N\log \log N}})\)和输出组\(\mathbb {Z}_{2^\tau }\)的4服务器DPF。前者允许我们部分回答Boyle, Gilboa, Ishai和Kolobov (ITC 2022)提出的开放性问题,后者允许我们构建第一个dpf,可以将任何有限阿贝尔群作为输出群。我们还讨论了如何通过使用不同的pir来进一步减小密钥大小,如何通过统计安全性或使用良好的整数来减少服务器数量,以及如何使用t-security获得dpf。我们通过构造新的高效PIR协议来展示新的dpf的应用,并对结果进行了验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Designs, Codes and Cryptography
Designs, Codes and Cryptography 工程技术-计算机:理论方法
CiteScore
2.80
自引率
12.50%
发文量
157
审稿时长
16.5 months
期刊介绍: Designs, Codes and Cryptography is an archival peer-reviewed technical journal publishing original research papers in the designated areas. There is a great deal of activity in design theory, coding theory and cryptography, including a substantial amount of research which brings together more than one of the subjects. While many journals exist for each of the individual areas, few encourage the interaction of the disciplines. The journal was founded to meet the needs of mathematicians, engineers and computer scientists working in these areas, whose interests extend beyond the bounds of any one of the individual disciplines. The journal provides a forum for high quality research in its three areas, with papers touching more than one of the areas especially welcome. The journal also considers high quality submissions in the closely related areas of finite fields and finite geometries, which provide important tools for both the construction and the actual application of designs, codes and cryptographic systems. In particular, it includes (mostly theoretical) papers on computational aspects of finite fields. It also considers topics in sequence design, which frequently admit equivalent formulations in the journal’s main areas. Designs, Codes and Cryptography is mathematically oriented, emphasizing the algebraic and geometric aspects of the areas it covers. The journal considers high quality papers of both a theoretical and a practical nature, provided they contain a substantial amount of mathematics.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信