[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2025/095

Non-Interactive Distributed Point Functions

Elette Boyle, Reichman University, NTT Research
Lalita Devadas, Massachusetts Institute of Technology
Sacha Servan-Schreiber, Massachusetts Institute of Technology
Abstract

Distributed Point Functions (DPFs) are a useful cryptographic primitive enabling a dealer to distribute short keys to two parties, such that the keys encode additive secret shares of a secret point function. However, in many applications of DPFs, no single dealer entity has full knowledge of the secret point function, necessitating the parties to run an interactive protocol to emulate the setup. Prior works have aimed to minimize complexity metrics of such distributed setup protocols, e.g., round complexity, while remaining black-box in the underlying cryptography. We construct Non-Interactive DPFs (NIDPF), which have a one-round (simultaneous-message, semi-honest) setup protocol, removing the need for a trusted dealer. Specifically, our construction allows each party to publish a special "public key" to a public channel or bulletin board, where the public key encodes the party's secret function parameters. Using the public key of another party, any pair of parties can locally derive a DPF key for the point function parameterized by the two parties' joint inputs. We realize NIDPF from an array of standard assumptions, including DCR, SXDH, QR, and LWE. Each party's public key is of size $O(N^{2/3})$, for point functions with a domain of size $N$, which leads to a sublinear communication setup protocol. The only prior approach to realizing such a non-interactive setup required using multi-key fully-homomorphic encryption or indistinguishability obfuscation. As immediate applications of our construction, we get "public-key setups" for several existing constructions of pseudorandom correlation generators and round-efficient protocols for secure comparisons.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
distributed point functionsnon-Interactivesecure computationpseudorandom correlation generatorssecret sharing
Contact author(s)
elette boyle @ ntt-research com
lali @ mit edu
3s @ mit edu
History
2025-01-22: revised
2025-01-21: received
See all versions
Short URL
https://ia.cr/2025/095
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/095,
      author = {Elette Boyle and Lalita Devadas and Sacha Servan-Schreiber},
      title = {Non-Interactive Distributed Point Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/095},
      year = {2025},
      url = {https://eprint.iacr.org/2025/095}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.