Communications in Cryptology IACR CiC

Compact Key Function Secret Sharing with Non-linear Decoder

Authors

Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay
Chandan Kumar ORCID
IIT Kharagpur, India
cchaudhary278 at kgpian dot iitkgp dot ac dot in
Sikhar Patranabis ORCID
IBM Research, India
sikhar dot patranabis at ibm dot com
Debdeep Mukhopadhyay ORCID
IIT Kharagpur, India
debdeep at cse dot iitkgp dot ac dot in
Keywords: Template LaTeX IACR

References

[BBCG+21]
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai. Lightweight techniques for private heavy hitters. In 2021 IEEE Symposium on Security and Privacy (SP), pages 762–776. 2021. IEEE. DOI: 10.1109/SP40001.2021.00048
[BCG+19]
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl. Efficient pseudorandom correlation generators: Silent OT extension and more. In Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III 39, pages 489–518. 2019. Springer. DOI: https://doi.org/10.1007/978-3-030-26954-8_16
[BCG+21]
Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, and Mayank Rathee. Function secret sharing for mixed-mode and fixed-point secure computation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 871–900. 2021. Springer. DOI: https://doi.org/10.1007/978-3-030-77886-6_30
[BGI15]
Elette Boyle, Niv Gilboa, and Yuval Ishai. Function secret sharing. In Annual international conference on the theory and applications of cryptographic techniques, pages 337–367. 2015. Springer. DOI: https://doi.org/10.1007/978-3-662-46803-6_12
[BGI16]
Elette Boyle, Niv Gilboa, and Yuval Ishai. Function Secret Sharing: Improvements and Extensions. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 1292–1303, New York, NY, USA. 2016. Association for Computing Machinery. DOI: 10.1145/2976749.2978429
[BGI19]
Elette Boyle, Niv Gilboa, and Yuval Ishai. Secure computation with preprocessing via function secret sharing. In Theory of Cryptography Conference, pages 341–371. 2019. Springer. DOI: https://doi.org/10.1007/978-3-030-36030-6_14
[BGIK22]
Elette Boyle, Niv Gilboa, Yuval Ishai, and Victor I. Kolobov. Information-Theoretic Distributed Point Functions. In Dana Dachman-Soled, editor, 3rd Conference on Information-Theoretic Cryptography (ITC 2022), volume 230 of Leibniz International Proceedings in Informatics (LIPIcs), pages 17:1–17:14, Dagstuhl, Germany. 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. DOI: 10.4230/LIPIcs.ITC.2022.17
[BKKO20]
Paul Bunn, Jonathan Katz, Eyal Kushilevitz, and Rafail Ostrovsky. Efficient 3-party distributed ORAM. In International Conference on Security and Cryptography for Networks, pages 215–232. 2020. Springer. DOI: https://doi.org/10.1007/978-3-030-57990-6_11
[BLMR13]
Dan Boneh, Kevin Lewi, Hart Montgomery, and Ananth Raghunathan. Key homomorphic PRFs and their applications. In Annual Cryptology Conference, pages 410–428. 2013. Springer. DOI: https://doi.org/10.1007/978-3-642-40041-4_23
[CGBM15]
Henry Corrigan-Gibbs, Dan Boneh, and David Mazières. Riposte: An anonymous messaging system handling millions of users. In 2015 IEEE Symposium on Security and Privacy, pages 321–338. 2015. IEEE. DOI: 10.1109/SP.2015.27
[DFL+20]
[DHRW16]
Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, and Daniel Wichs. Spooky Encryption and Its Applications. In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology – CRYPTO 2016, pages 93–122, Berlin, Heidelberg. 2016. Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-662-53015-3_4
[DIL+20]
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, and Angelos Stavrou. Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing. https://eprint.iacr.org/2020/1599. Cryptology ePrint Archive, Paper 2020/1599. 2020.
[DIL+22]
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, and Angelos Stavrou. Streaming and Unbalanced PSI from Function Secret Sharing. In International Conference on Security and Cryptography for Networks, pages 564–587. 2022. Springer. DOI: https://doi.org/10.1007/978-3-031-14791-3_25
[DS17]
Jack Doerner and Abhi Shelat. Scaling ORAM for Secure Computation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 523–535, New York, NY, USA. 2017. Association for Computing Machinery. DOI: 10.1145/3133956.3133967
[ECGZB21]
Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh. Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. In 30th USENIX Security Symposium (USENIX Security 21), pages 1775–1792. August 2021. USENIX Association.
[GI14]
Niv Gilboa and Yuval Ishai. Distributed point functions and their applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 640–658. 2014. Springer. DOI: https://doi.org/10.1007/978-3-642-55220-5_35
[GJM+23]
Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, and Rahul Sharma. SIGMA: Secure GPT Inference with Function Secret Sharing. https://eprint.iacr.org/2023/1269. Cryptology ePrint Archive, Paper 2023/1269. 2023.
[GKW18]
S Dov Gordon, Jonathan Katz, and Xiao Wang. Simple and efficient two-server ORAM. In International Conference on the Theory and Application of Cryptology and Information Security, pages 141–157. 2018. Springer. DOI: https://doi.org/10.1007/978-3-030-03332-3_6
[GO96]
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 43(3):431–473, May 1996. DOI: 10.1145/233551.233553
[GRS22]
Gayathri Garimella, Mike Rosulek, and Jaspal Singh. Structure-aware private set intersection, with applications to fuzzy matching. In Annual International Cryptology Conference, pages 323–352. 2022. Springer. DOI: https://doi.org/10.1007/978-3-031-15802-5_12
[GRS23]
Gayathri Garimella, Mike Rosulek, and Jaspal Singh. Malicious Secure, Structure-Aware Private Set Intersection. In Annual International Cryptology Conference, pages 577–610. 2023. Springer. DOI: https://doi.org/10.1007/978-3-031-38557-5_19
[HLC+23]
Meng Hao, Hongwei Li, Hanxiao Chen, Pengzhi Xing, and Tianwei Zhang. FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference. IEEE Transactions on Information Forensics and Security, 18:2569–2582, 2023. DOI: 10.1109/TIFS.2023.3262149
[JGB+24]
N. Jawalkar, K. Gupta, A. Basu, N. Chandran, D. Gupta, and R. Sharma. Orca: FSS-based Secure Training and Inference with GPUs. In 2024 IEEE Symposium on Security and Privacy (SP), pages 66-66, Los Alamitos, CA, USA. May 2024. IEEE Computer Society. DOI: 10.1109/SP54263.2024.00063
[JVC18]
Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18), pages 1651–1669, Baltimore, MD. August 2018. USENIX Association.
[MLS+20]
Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20), pages 2505–2522. August 2020. USENIX Association.
[MZ17]
Payman Mohassel and Yupeng Zhang. Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE symposium on security and privacy (SP), pages 19–38. 2017. IEEE. DOI: 10.1109/SP.2017.12
[NSSD22]
Zachary Newman, Sacha Servan-Schreiber, and Srinivas Devadas. Spectrum: High-bandwidth Anonymous Broadcast. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pages 229–248, Renton, WA. April 2022. USENIX Association.
[RPB20]
Théo Ryffel, David Pointcheval, and Francis R. Bach. ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing. CoRR, abs/2006.04593, 2020.
[RRK+20]
Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. CrypTFlow2: Practical 2-Party Secure Inference. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 325–342, New York, NY, USA. 2020. Association for Computing Machinery. DOI: 10.1145/3372297.3417274
[SCS+20]
Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, and Binxing Fang. An efficient 3-party framework for privacy-preserving neural network inference. In European Symposium on Research in Computer Security, pages 419–439. 2020. Springer. DOI: https://doi.org/10.1007/978-3-030-58951-6_21
[TSS+20]
Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, and Dawn Song. Epione: Lightweight Contact Tracing with Strong Privacy. CoRR, abs/2004.13293, 2020.
[VHG23]
Adithya Vadapalli, Ryan Henry, and Ian Goldberg. Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation. In 32nd USENIX Security Symposium (USENIX Security 23), pages 3907–3924, Anaheim, CA. August 2023. USENIX Association.
[VSH22]
Adithya Vadapalli, Kyle Storrier, and Ryan Henry. Sabre: Sender-Anonymous Messaging with Fast Audits. In 2022 IEEE Symposium on Security and Privacy (SP), pages 1953-1970. 2022. DOI: 10.1109/SP46214.2022.9833601
[Wag22]
Sameer Wagh. Pika: Secure Computation using Function Secret Sharing over Rings. Proc. Priv. Enhancing Technol., 2022(4):351–377, 2022. DOI: 10.56553/POPETS-2022-0113
[WGC19]
Sameer Wagh, Divya Gupta, and Nishanth Chandran. SecureNN: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies, 2019. DOI: https://doi.org/10.2478/popets-2019-0035
[YJG+23]
Peng Yang, Zoe L. Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siuming Yiu, Yulin Wu, and Xuan Wang. FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing. https://eprint.iacr.org/2023/073. Cryptology ePrint Archive, Paper 2023/073. 2023.

PDFPDF Open access

History
Submitted: 2024-04-02
Accepted: 2024-06-03
Published: 2024-07-08
How to cite

Chandan Kumar, Sikhar Patranabis, and Debdeep Mukhopadhyay, Compact Key Function Secret Sharing with Non-linear Decoder. IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/a3c3c3w9p.

License

Copyright is held by the author(s)

This work is licensed under a Creative Commons Attribution (CC BY) license.