TY - GEN
T1 - Locality-Preserving Hashing for Shifts with Connections to Cryptography
AU - Boyle, Elette
AU - Dinur, Itai
AU - Gilboa, Niv
AU - Ishai, Yuval
AU - Keller, Nathan
AU - Klein, Ohad
N1 - Funding Information:
Funding Elette Boyle: AFOSR Award FA9550-21-1-0046, ERC Project HSS (852952), and a Google Research Scholar Award. Itai Dinur: ISF grant 1903/20 and ERC starting grant 757731 (LightCrypt). Niv Gilboa: ISF grant 2951/20, ERC grant 876110, and a grant by the BGU Cyber Center.
Funding Information:
Yuval Ishai: ERC Project NTSC (742754), ISF grant 2774/20, and BSF grant 2018393. Nathan Keller: ERC starting grant 757731 (LightCrypt) and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. Ohad Klein: Supported by the Clore Scholarship Programme.
Publisher Copyright:
© Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, and Ohad Klein; licensed under Creative Commons License CC-BY 4.0
PY - 2022/1/25
Y1 - 2022/1/25
N2 - Can we sense our location in an unfamiliar environment by taking a sublinear-size sample of our surroundings? Can we efficiently encrypt a message that only someone physically close to us can decrypt? To solve this kind of problems, we introduce and study a new type of hash functions for finding shifts in sublinear time. A function h : {0, 1}n → ℤn is a (d, δ) locality-preserving hash function for shifts (LPHS) if: (1) h can be computed by (adaptively) querying d bits of its input, and (2) Pr [h(x) ≠ h(x ≪ 1) + 1] ≤ δ, where x is random and ≪ 1 denotes a cyclic shift by one bit to the left. We make the following contributions. - Near-optimal LPHS via Distributed Discrete Log. We establish a general two-way connection between LPHS and algorithms for distributed discrete logarithm in the generic group model. Using such an algorithm of Dinur et al. (Crypto 2018), we get LPHS with near-optimal error of δ = Õ(1/d2). This gives an unusual example for the usefulness of group-based cryptography in a post-quantum world. We extend the positive result to non-cyclic and worst-case variants of LPHS. - Multidimensional LPHS. We obtain positive and negative results for a multidimensional extension of LPHS, making progress towards an optimal 2-dimensional LPHS. - Applications. We demonstrate the usefulness of LPHS by presenting cryptographic and algorithmic applications. In particular, we apply multidimensional LPHS to obtain an efficient “packed” implementation of homomorphic secret sharing and a sublinear-time implementation of location-sensitive encryption whose decryption requires a significantly overlapping view.
AB - Can we sense our location in an unfamiliar environment by taking a sublinear-size sample of our surroundings? Can we efficiently encrypt a message that only someone physically close to us can decrypt? To solve this kind of problems, we introduce and study a new type of hash functions for finding shifts in sublinear time. A function h : {0, 1}n → ℤn is a (d, δ) locality-preserving hash function for shifts (LPHS) if: (1) h can be computed by (adaptively) querying d bits of its input, and (2) Pr [h(x) ≠ h(x ≪ 1) + 1] ≤ δ, where x is random and ≪ 1 denotes a cyclic shift by one bit to the left. We make the following contributions. - Near-optimal LPHS via Distributed Discrete Log. We establish a general two-way connection between LPHS and algorithms for distributed discrete logarithm in the generic group model. Using such an algorithm of Dinur et al. (Crypto 2018), we get LPHS with near-optimal error of δ = Õ(1/d2). This gives an unusual example for the usefulness of group-based cryptography in a post-quantum world. We extend the positive result to non-cyclic and worst-case variants of LPHS. - Multidimensional LPHS. We obtain positive and negative results for a multidimensional extension of LPHS, making progress towards an optimal 2-dimensional LPHS. - Applications. We demonstrate the usefulness of LPHS by presenting cryptographic and algorithmic applications. In particular, we apply multidimensional LPHS to obtain an efficient “packed” implementation of homomorphic secret sharing and a sublinear-time implementation of location-sensitive encryption whose decryption requires a significantly overlapping view.
KW - Discrete logarithm
KW - Homomorphic secret sharing
KW - Metric embeddings
KW - Shift finding
KW - Sublinear algorithms
UR - http://www.scopus.com/inward/record.url?scp=85124001339&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.ITCS.2022.27
DO - 10.4230/LIPIcs.ITCS.2022.27
M3 - Conference contribution
AN - SCOPUS:85124001339
T3 - Leibniz International Proceedings in Informatics, LIPIcs
SP - 27:1-27:24
BT - 13th Innovations in Theoretical Computer Science Conference, ITCS 2022
A2 - Braverman, Mark
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 13th Innovations in Theoretical Computer Science Conference, ITCS 2022
Y2 - 31 January 2022 through 3 February 2022
ER -