skip to main content
10.1145/3488932.3517403acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Iterative Oblivious Pseudo-Random Functions and Applications

Published: 30 May 2022 Publication History

Abstract

We consider the problem of a client querying an encrypted binary tree structure, outsourced to an untrusted server. While the server must not learn the contents of the binary tree, we also prevent the client from maliciously crafting a query that traverses the tree out-of-order. That is, the client should not be able to retrieve nodes outside one contiguous path from the root to a leaf. Finally, the server should not learn which path the client accesses, but is guaranteed that the access corresponds to one valid path in the tree. This is an extension of protocols such as structured encryption, where it is only guaranteed that the tree's encrypted data remains hidden from the server.
To this end, we initiate the study of Iterative Oblivious Pseudorandom Functions (iOPRFs), new primitives providing two-sided, fully malicious security for these types of applications. We present a first, efficient iOPRF construction secure against both malicious clients and servers in the standard model, based on the DDH assumption. We demonstrate that iOPRFs are useful to implement different interesting applications, including an RFID authentication protocol and a protocol for private evaluation of outsourced decision trees. Finally, we implement and evaluate our full iOPRF construction and show that it is efficient in practice.

Supplementary Material

MP4 File (ASIA-CCS22-fp415.mp4)
We consider the problem of a client querying an encrypted tree structure, outsourced to an untrusted server. While the server must not learn the contents of the binary tree, we also prevent the client from maliciously crafting a query that traverses the tree out-of-order. That is, the client should not be able to retrieve nodes outside one contiguous path from the root to a leaf. Finally, the server should not learn which path the client accesses, but is guaranteed that the access corresponds to one valid path in the tree. To this end, we initiate the study of Iterative Oblivious Pseudorandom Functions (iOPRFs), new primitives providing malicious security for these applications. We present an efficient iOPRF construction secure against malicious clients and servers in the standard model. We demonstrate that iOPRFs are useful to implement different interesting applications, including an RFID authentication protocol and a protocol for the evaluation of outsourced decision trees.

References

[1]
G. Asharov, Y. Lindell, T. Schneider, and M. Zohner. More Efficient Oblivious Transfer Extensions. J. Cryptol., 30 (3): 805--858, 2017.
[2]
E.-O. Blass, F. Kerschbaum, and T. Mayberry. Source code, 2021. https://github.com/tmayberry/ioprf.
[3]
D. Boneh, H.W. Montgomery, and A. Raghunathan. Algebraic pseudorandom functions with improved efficiency from the augmented cascade. In CCS, pages 131--140, 2010.
[4]
D. Boneh, D. Kogan, and K. Woo. Oblivious Pseudorandom Functions from Isogenies. In ASIACRYPT, pages 520--550, 2020.
[5]
E. Boyle, N. Gilboa, and Y. Ishai. Function secret sharing: Improvements and extensions. In CCS, pages 1292--1303, 2016.
[6]
E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, L. Kohl, P. Rindal, and P. Scholl. Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. In CCS, pages 291--308, 2019.
[7]
J. Camenisch and M. Stadler. Proof systems for general statements about discrete logarithms. Technical Report/ETH Zurich, Department of Computer Science, 260, 1997.
[8]
J. Camenisch, G. Neven, and A. Shelat. Simulatable Adaptive Oblivious Transfer. In M. Naor, editor, Advances in Cryptology - EUROCRYPT 2007, volume 4515 of Lecture Notes in Computer Science, pages 573--590. Springer, 2007.
[9]
Yan-Cheng Chang. Single database private information retrieval with logarithmic communication. In Australasian Conference on Information Security and Privacy, pages 50--61. Springer, 2004.
[10]
M. Chase and S. Kamara. Structured encryption and controlled disclosure. In ASIACRYPT, pages 577--594. Springer, 2010.
[11]
M. Chase and P. Miao. Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF. In CRYPTO 2020, volume 12172, pages 34--63, 2020.
[12]
D. Chaum. Blind Signatures for Untraceable Payments. In CRYPTO, pages 199--203, 1982.
[13]
D. Chaum and T. P. Pedersen. Wallet Databases with Observers. In CRYPTO, volume 740, pages 89--105, 1992.
[14]
C.-K. Chu, S.S.M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans. Parallel Distributed Syst., 25 (2): 468--477, 2014.
[15]
C. Crepeau, J. van de Graaf, and A. Tapp. Committed Oblivious Transfer and Private Multi-Party Computation. In CRYPTO, volume 963, pages 110--123, 1995.
[16]
I. Dam­gård, M. Geisler, and M. Krøigaard. Efficient and secure comparison for on-line auctions. In ACISP, pages 416--430, 2007.
[17]
Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. In PKC, volume 3386, pages 416--431, 2005.
[18]
M.J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. In TCC, volume 3378, pages 303--324, 2005.
[19]
O. Goldreich. The Foundations of Cryptography -- Volume 1: Basic Techniques, chapter 3.6.4, pages 158--159. Cambridge University Press, 2001.
[20]
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33 (4): 792--807, 1986.
[21]
J. Håstad, R. Impagliazzo, L.A. Levin, and M. Luby. A Pseudorandom Generator from any One-way Function. SIAM J. Comput., 28 (4): 1364--1396, 1999.
[22]
C. Hazay and Y. Lindell. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In TCC, volume 4948, pages 155--175, 2008.
[23]
C. Hazay and Y. Lindell. Efficient Secure Two-Party Protocols - Techniques and Constructions. Springer, 2010. ISBN 978-3-642-14302-1.
[24]
B.A. Huberman, M.K. Franklin, and T. Hogg. Enhancing privacy and trust in electronic communities. In Conference on Electronic Commerce, 1999.
[25]
S. Jarecki and X. Liu. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In O. Reingold, editor, Theory of Cryptography, volume 5444 of Lecture Notes in Computer Science, pages 577--594. Springer, 2009 a.
[26]
S. Jarecki and X. Liu. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In TCC, volume 5444, pages 577--594, 2009 b.
[27]
S. Jarecki and V. Shmatikov. Efficient Two-Party Secure Computation on Committed Inputs. In EUROCRYPT, volume 4515, pages 97--114, 2007.
[28]
S. Jarecki, A. Kiayias, and H. Krawczyk. Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. In ASIACRYPT, volume 8874, pages 233--253, 2014.
[29]
A. Juels. RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun., 24 (2): 381--394, 2006.
[30]
M. Keller. MP-SPDZ: A versatile framework for multi-party computation. In CCS, pages 1575--1590, 2020.
[31]
A. Kiayias, S. Papadopoulos, N. Triandopoulos, and T. Zacharias. Delegatable pseudorandom functions and applications. In CCS, pages 669--684, 2013.
[32]
M.S. Kiraz, B. Schoenmakers, and J. Villegas. Efficient Committed Oblivious Transfer of Bit Strings. In Information Security, 10th International Conference, ISC, volume 4779, pages 130--144, 2007.
[33]
Á. Kiss, M. Naderpour, J. Liu, N. Asokan, and T. Schneider. SoK: Modular and Efficient Private Decision Tree Evaluation. Proc. Priv. Enhancing Technol., 2019 (2): 187--208, 2019.
[34]
V. Kolesnikov, R. Kumaresan, M. Rosulek, and N. Trieu. Efficient Batched Oblivious PRF with Applications to Private Set Intersection. In CCS, pages 818--829, 2016.
[35]
R.W.F. Lai and S.S.M. Chow. Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. In D. Gollmann, A. Miyaji, and H. Kikuchi, editors, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, volume 10355 of Lecture Notes in Computer Science, pages 478--497. Springer, 2017.
[36]
A.B. Lewko and B. Waters. Efficient Pseudorandom Functions from the Decisional Linear Assumption and Weaker Variants. In CCS, page 112--120, New York, NY, USA, 2009. ISBN 9781605588940.
[37]
Y. Lindell. How to Simulate It - A Tutorial on the Simulation Proof Technique. In Tutorials on the Foundations of Cryptography, pages 277--346. 2017.
[38]
D. Molnar, A. Soppera, and D. A. Wagner. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In SAC, volume 3897, pages 276--290, 2005.
[39]
M. Naor and O. Reingold. Number-theoretic Constructions of Efficient Pseudo-random Functions. In FOCS, pages 458--467, 1997.
[40]
Verizon. IP Latency Statistics, 2021. https://enterprise.verizon.com/terms/latency/.
[41]
X. Wang, S. Ranellucci, and J. Katz. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation. In CCS, pages 21--37, 2017.
[42]
D.J. Wu, T. Feng, M. Naehrig, and K. Lauter. Privately evaluating decision trees and random forests. Privacy Enhancing Technologies, 2016 (4): 335--355, 2016.

Cited By

View all
  • (2023)A comprehensive survey of cryptography key management systemsJournal of Information Security and Applications10.1016/j.jisa.2023.10360778:COnline publication date: 1-Nov-2023
  • (2023)GPU Cloud Architectures for Bioinformatic ApplicationsBioinformatics and Biomedical Engineering10.1007/978-3-031-34953-9_6(77-89)Online publication date: 12-Jul-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
May 2022
1291 pages
ISBN:9781450391405
DOI:10.1145/3488932
Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 2pc
  2. decision trees
  3. malicious security
  4. oprf

Qualifiers

  • Research-article

Conference

ASIA CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A comprehensive survey of cryptography key management systemsJournal of Information Security and Applications10.1016/j.jisa.2023.10360778:COnline publication date: 1-Nov-2023
  • (2023)GPU Cloud Architectures for Bioinformatic ApplicationsBioinformatics and Biomedical Engineering10.1007/978-3-031-34953-9_6(77-89)Online publication date: 12-Jul-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media