Paper 2024/1613
Efficient Maliciously Secure Oblivious Exponentiations
Abstract
Oblivious Pseudorandom Functions (OPRFs) allow a client to evaluate a pseudorandom function (PRF) on her secret input based on a key that is held by a server. In the process, the client only learns the PRF output but not the key, while the server neither learns the input nor the output of the client. The arguably most popular OPRF is due to Naor, Pinkas and Reingold (Eurocrypt 2009). It is based on an Oblivious Exponentiation by the server, with passive security under the Decisional Diffie-Hellman assumption. In this work, we strengthen the security guarantees of the NPR OPRF by protecting it against active attacks of the server. We have implemented our solution and report on the performance.
Our main result is a new batch OPRF protocol which is secure against maliciously corrupted servers, but is essentially as efficient as the semi-honest solution. More precisely, the computation (and communication) overhead is a multiplicative factor
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published by the IACR in CIC 2024
- DOI
- 10.62056/a66cy7qiu
- Contact author(s)
-
cabau @ dtu dk
ivan @ cs au dk
foner @ securedna org - History
- 2024-10-11: approved
- 2024-10-10: received
- See all versions
- Short URL
- https://ia.cr/2024/1613
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1613, author = {Carsten Baum and Jens Berlips and Walther Chen and Ivan Damgård and Kevin M. Esvelt and Leonard Foner and Dana Gretton and Martin Kysel and Ronald L. Rivest and Lawrence Roy and Francesca Sage-Ling and Adi Shamir and Vinod Vaikuntanathan and Lynn Van Hauwe and Theia Vogel and Benjamin Weinstein-Raun and Daniel Wichs and Stephen Wooster and Andrew C. Yao and Yu Yu}, title = {Efficient Maliciously Secure Oblivious Exponentiations}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1613}, year = {2024}, doi = {10.62056/a66cy7qiu}, url = {https://eprint.iacr.org/2024/1613} }