Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection

203Citations
Citations of this article
69Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

An Oblivious Pseudorandom Function (OPRF) [15] is a two-party protocol between sender S and receiver R for securely computing a pseudorandom function f k (•) on key k contributed by S and input x contributed by R, in such a way that receiver R learns only the value f k (x) while sender S learns nothing from the interaction. In other words, an OPRF protocol for PRF f k (•) is a secure computation for functionality . We propose an OPRF protocol on committed inputs which requires only O(1) modular exponentiations, and has a constant number of communication rounds (two in ROM). Our protocol is secure in the CRS model under the Composite Decisional Residuosity (CDR) assumption, while the PRF itself is secure on a polynomially-sized domain under the Decisional q-Diffie-Hellman Inversion assumption on a group of composite order, where q is the size of the PRF domain, and it has a useful feature that f k is an injection for every k. practical OPRF protocol for an injective PRF, even limited to a polynomially-sized domain, is a versatile tool with many uses in secure protocol design. We show that our OPRF implies a new practical fully-simulatable adaptive (and committed) OT protocol secure without ROM. In another example, this oblivious PRF construction implies the first secure computation protocol of set intersection on committed data with computational cost of O(N) exponentiations where N is the maximum size of both data sets. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Jarecki, S., & Liu, X. (2009). Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5444 LNCS, pp. 577–594). https://doi.org/10.1007/978-3-642-00457-5_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free