🤖 AI Summary
PRG-based multi-party distributed point functions (DPFs) suffer from exponential growth in key size with respect to both the number of parties and the domain size, severely limiting their practicality in private information retrieval and anonymous communication.
Method: This paper presents the first efficient PRG-based multi-user DPF construction, operating under the honest-majority assumption and breaking the exponential bottleneck inherent in Boyle et al.’s EUROCRYPT’15 framework.
Contribution/Results: We introduce a novel key generation and distribution mechanism that ensures security while achieving linear scalability in key size, computational cost, and communication complexity. Our scheme reduces key size to one-third that of prior constructions. Experimental evaluation confirms it is the most efficient multi-user DPF to date, significantly advancing the deployment readiness of PRG-based DPFs in real-world systems.
📝 Abstract
Distributed Point Functions (DPFs) enable sharing secret point functions across multiple parties, supporting privacy-preserving technologies such as Private Information Retrieval, and anonymous communications. While 2-party PRG-based schemes with logarithmic key sizes have been known for a decade, extending these solutions to multi-party settings has proven challenging. In particular, PRG-based multi-party DPFs have historically struggled with practicality due to key sizes growing exponentially with the number of parties and the field size.
Our work addresses this efficiency bottleneck by optimizing the PRG-based multi-party DPF scheme of Boyle et al. (EUROCRYPT'15). By leveraging the honest-majority assumption, we eliminate the exponential factor present in this scheme. Our construction is the first PRG-based multi-party DPF scheme with practical key sizes, and provides key up to 3x smaller than the best known multi-party DPF. This work demonstrates that with careful optimization, PRG-based multi-party DPFs can achieve practical performances, and even obtain top performances.