Paper 2024/1613
Efficient Maliciously Secure Oblivious Exponentiations
Abstract
Oblivious Pseudorandom Functions (OPRFs) allow a client to evaluate a pseudorandom function (PRF) on her secret input based on a key that is held by a server. In the process, the client only learns the PRF output but not the key, while the server neither learns the input nor the output of the client. The arguably most popular OPRF is due to Naor, Pinkas and Reingold (Eurocrypt 2009). It is based on an Oblivious Exponentiation by the server, with passive security under the Decisional Diffie-Hellman assumption. In this work, we strengthen the security guarantees of the NPR OPRF by protecting it against active attacks of the server. We have implemented our solution and report on the performance. Our main result is a new batch OPRF protocol which is secure against maliciously corrupted servers, but is essentially as efficient as the semi-honest solution. More precisely, the computation (and communication) overhead is a multiplicative factor $o(1)$ as the batch size increases. The obvious solution using zero-knowledge proofs would have a constant factor overhead at best, which can be too expensive for certain deployments. Our protocol relies on a novel version of the DDH problem, which we call the Oblivious Exponentiation Problem (OEP), and we give evidence for its hardness in the Generic Group model. We also present a variant of our maliciously secure protocol that does not rely on the OEP but nevertheless only has overhead $o(1)$ over the known semi-honest protocol. Moreover, we show that our techniques can also be used to efficiently protect threshold blind BLS signing and threshold ElGamal decryption against malicious attackers.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published by the IACR in CIC 2024
- DOI
- 10.62056/a66cy7qiu
- Contact author(s)
-
cabau @ dtu dk
ivan @ cs au dk
foner @ securedna org - History
- 2024-10-11: approved
- 2024-10-10: received
- See all versions
- Short URL
- https://ia.cr/2024/1613
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1613, author = {Carsten Baum and Jens Berlips and Walther Chen and Ivan Damgård and Kevin M. Esvelt and Leonard Foner and Dana Gretton and Martin Kysel and Ronald L. Rivest and Lawrence Roy and Francesca Sage-Ling and Adi Shamir and Vinod Vaikuntanathan and Lynn Van Hauwe and Theia Vogel and Benjamin Weinstein-Raun and Daniel Wichs and Stephen Wooster and Andrew C. Yao and Yu Yu}, title = {Efficient Maliciously Secure Oblivious Exponentiations}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1613}, year = {2024}, doi = {10.62056/a66cy7qiu}, url = {https://eprint.iacr.org/2024/1613} }