Round-efficient oblivious database manipulation

  • Authors:
  • Sven Laur;Jan Willemson;Bingsheng Zhang

  • Affiliations:
  • Institute of Computer Science, University of Tartu, Tartu, Estonia;Cybernetica, Tartu and Software Technology and Applications Competence Center, Estonia;Cybernetica, and Institute of Computer Science, University of Tartu, Tartu, Estonia

  • Venue:
  • ISC'11 Proceedings of the 14th international conference on Information security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most of the multi-party computation frameworks can be viewed as oblivious databases where data is stored and processed in a secret-shared form. However, data manipulation in such databases can be slow and cumbersome without dedicated protocols for certain database operations. In this paper, we provide efficient protocols for oblivious selection, filtering and shuffle--essential tools in privacy-preserving data analysis. As the first contribution, we present a 1-out-of n oblivious transfer protocol with O(log log n) rounds, which achieves optimal communication and time complexity and works over any ring ZN. Secondly, we show how to construct round-efficient shuffle protocols with optimal asymptotic computation complexity and provide several optimizations.