Private Access Control for Function Secret Sharing

In function secret sharing (FSS) a dealer can privately outsource some function \(f\) to a set of evaluators. These evaluators can evaluate the function on some input \(x\) without learning the result of the computation \(f(x)\). We introduce the notion of private access control for function secret sharing, whereby we restrict the dealer to only be able to secret-share a function that they have been granted access to, all while maintaining privacy.

References

2023

Private Access Control for Function Secret Sharing

Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f(x) on an input x, without learning information about f. In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family F and an access control list defined over the family, the evaluators receiving the shares of f ∈ F can efficiently check that the dealer knows the access key for f. This model enables new applications of FSS, such as: anonymous authentication in a multi-party setting, access control in private databases, and authentication and spam prevention in anonymous communication systems. Our definitions and constructions abstract and improve the concrete efficiency of several re- cent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest. We evaluate our constructions and show a 50–70× reduction in computational overhead com- pared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5–3× when amortized over databases with 500,000 or more items.