Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978429
|View full text |Cite
|
Sign up to set email alerts
|

Function Secret Sharing

Abstract: Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f : {0, 1} n → G, for some abelian group G, into functions f1, . . . , fm, described by keys k1, . . . , km, such that f = f1 + . . . + fm and every strict subset of the keys hides f . A Distributed Point Function (DPF) is a special case where F is the family of point functions, namely functio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 231 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…To this end, the construction associates with each layer of the tree shares one λ-bit CW, the two least-significant bits of which are special toggle bits that help the evaluator decide to which nodes it should "apply" the CW. The precise details of how to generate and apply CWs (and toggle bits) goes beyond what is needed to understand our MUX and DeMUX constructions; for brevity, we omit those details here and direct interested readers to Gilboa and Ishai [20] and Boyle et al [9]. For our purposes, it suffices to know that 1. each node (in each tree share) is associated with its own flag bit that is determined by a combination of the toggle bits and node labels produced by the PRG output together with the CW for the preceding layer;…”
Section: Boyle-gilboa-ishai (22)-dpfsmentioning
confidence: 99%
See 1 more Smart Citation
“…To this end, the construction associates with each layer of the tree shares one λ-bit CW, the two least-significant bits of which are special toggle bits that help the evaluator decide to which nodes it should "apply" the CW. The precise details of how to generate and apply CWs (and toggle bits) goes beyond what is needed to understand our MUX and DeMUX constructions; for brevity, we omit those details here and direct interested readers to Gilboa and Ishai [20] and Boyle et al [9]. For our purposes, it suffices to know that 1. each node (in each tree share) is associated with its own flag bit that is determined by a combination of the toggle bits and node labels produced by the PRG output together with the CW for the preceding layer;…”
Section: Boyle-gilboa-ishai (22)-dpfsmentioning
confidence: 99%
“…In this section we provide the security proofs for MPC subprotocols used in this paper. These proofs rely on the simulatability of DPFs (see [9] for the proofs that DPFs are secure).…”
Section: Simulators For Subprotocolsmentioning
confidence: 99%
“…+ f m (x), for any input x. The notion of verifiable FSS (VFSS) [11] is introduced by Boyle et al In particular, VFSS consists of interactive protocols that verify the consistency of some function f ∈ F with keys (k * 1 , . .…”
Section: Related Workmentioning
confidence: 99%
“…which are generated by a potentially malicious user. However, VFSS [11] is applicable in the setting of multiple servers and one client. On the contrary, VHSS can be applied when multiple clients (multi-input) outsource the joint computation to multiple servers.…”
Section: Related Workmentioning
confidence: 99%
“…In the 2-server setting, several works have employed (2, 2)-DPFs to achieve low upload costs [8,12,17], while Angel, Chen, Laine, and Setty [2] proposed a novel technique to obtain low upload costs in single-server FHE-based PIR using so-called plaintext slot permutations. For > 2 servers, there does not appear to be any prior work that provides upload costs scaling sublinearly in r .…”
Section: A Related Workmentioning
confidence: 99%