[BCG+19] Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, and Peter Scholl. Efficient two-round OT extension and silent non-interactive secure computation. In Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz, editors, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pages 291308. ACM, 2019.
[BKM+20] Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, and Vlad Vlaskin. Private matching for compute. IACR Cryptol. ePrint Arch., 2020:599, 2020.
[Bol84] B ́ela Bollob ́as. The evolution of random graphs. Transactions of the American Mathematical Society, 286(1):257–274, 1984.
[CGS22] Nishanth Chandran, Divya Gupta, and Akash Shah. Circuit-psi with linear complexity via relaxed batch opprf. Proceedings on Privacy Enhancing Technologies (PETs), 2022. https://eprint.iacr.org/2021/034.
[CRR21] Geoffroy Couteau, Peter Rindal, and Srinivasan Raghuraman. Silver: Silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III, volume 12827 of Lecture Notes in Computer Science, pages 502–534. Springer, 2021.
[CT10] Emiliano De Cristofaro and Gene Tsudik. Practical private set intersection protocols with linear complexity. In Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 143–159. Springer, 2010.
[DM08] Amir Dembo and Andrea Montanari. Finite size scaling for the core of large random hypergraphs. The Annals of Applied Probability, 18(5), 2008.
[ER59] Paul Erd ̈os and Alfr ́ed R ́enyi. On random graphs i. Publ. Math. Debrecen, 6:290–397, 1959.
[FK21] Alan Frieze and Michal Karo ́ nski. Introduction to random graphs, 2021.
[FKK03] Andr ́as Frank, Tam ́as Kir ́aly, and Matthias Kriesell. On decomposing a hypergraph into k connected sub-hypergraphs. Discret. Appl. Math., 131(2):373–383, 2003.
[For17] Quentin Fortier. Aspects of connectivity with matroid constraints in graphs modeling and simulation. Universit ́e Grenoble Alpes, NNT : 2017GREAM059, 2017.
[GPR+] Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, and Avishay Yanai. OBDBasedPSI . github.com/cryptobiu/OBDBasedPSI.
[GPR+21] Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, and Avishay Yanai. Oblivious key-value stores and amplification for private set intersection. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II, volume 12826 of Lecture Notes in Computer Science, pages 395425. Springer, 2021.
[HEK12] Yan Huang, David Evans, and Jonathan Katz. Private set intersection: Are garbled circuits better than custom protocols? In 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012. The Internet Society, 2012.
[IKN+20] Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, and Moti Yung. On deploying secure computing: Private intersection-sum-with-cardinality. In EuroS&P, pages 370–389. IEEE, 2020.
[IKNP03] Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. Extending oblivious transfers efficiently. In CRYPTO, volume 2729 of Lecture Notes in Computer Science, pages 145–161. Springer, 2003.
[KKRT16] Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. Efficient batched oblivious PRF with applications to private set intersection. IACR Cryptol. ePrint Arch., page 799, 2016.
[Luc90] Tomasz Luczak. Component behavior near the critical point of the random graph process. Random Struct. Algorithms, 1(3):287–310, 1990.
[Mea86] Catherine A. Meadows. A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party. In IEEE Symposium on Security and Privacy, pages 134–137. IEEE Computer Society, 1986.
[NTY21] Ofri Nevo, Ni Trieu, and Avishay Yanai. Simple, fast malicious multiparty private set intersection, 2021. https://ia.cr/2021/1221.
[OOS17] Michele Orr` u, Emmanuela Orsini, and Peter Scholl. Actively secure 1-out-of-n OT extension with application to private set intersection. In CT-RSA, volume 10159 of Lecture Notes in Computer Science, pages 381–396. Springer, 2017.
[Oxl06] J.G. Oxley. Matroid Theory. Oxford graduate texts in mathematics. Oxford University Press, 2006.
[PRTY19] Benny Pinkas, Mike Rosulek, Ni Trieu, and Avishay Yanai. Spot-light: Lightweight private set intersection from sparse OT extension. In CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, pages 401–431. Springer, 2019.
[PRTY20] Benny Pinkas, Mike Rosulek, Ni Trieu, and Avishay Yanai. PSI from paxos: Fast, malicious private set intersection. In Anne Canteaut and Yuval Ishai, editors, Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part II, volume 12106 of Lecture Notes in Computer Science, pages 739–767. Springer, 2020.
[PSSZ15] Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. Phasing: Private set intersection using permutation-based hashing. In USENIX Security Symposium, pages 515–530. USENIX Association, 2015.
[PSZ14] Benny Pinkas, Thomas Schneider, and Michael Zohner. Faster private set intersection based on OT extension. In USENIX Security Symposium, pages 797–812. USENIX Association, 2014.
[PW88] Christos H. Papadimitriou and David Wolfe. The complexity of facets resolved. J. Comput. Syst. Sci., 37(1):2–13, 1988.
[RR17] Peter Rindal and Mike Rosulek. Malicious-secure private set intersection via dual execution. In ACM Conference on Computer and Communications Security, pages 1229–1242. ACM, 2017.
[RS21] Peter Rindal and Phillipp Schoppmann. VOLE-PSI: fast OPRF and circuit-psi from vector-ole. In Anne Canteaut and Fran ̧cois-Xavier Standaert, editors, Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part II, volume 12697 of Lecture Notes in Computer Science, pages 901930. Springer, 2021.
[Wal21] Stefan Walzer. Peeling close to the orientability threshold - spatial coupling in hashingbased data structures. In D ́aniel Marx, editor, Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 - 13, 2021, pages 2194–2211. SIAM, 2021.
[ZLS06] Jianmin Zhang, Sikun Li, and ShengYu Shen. Extracting minimum unsatisfiable cores with a greedy genetic algorithm. In Abdul Sattar and Byeong-Ho Kang, editors, AI 2006: Advances in Artificial Intelligence, 19th Australian Joint Conference on Artificial Intelligence, Hobart, Australia, December 4-8, 2006, Proceedings, volume 4304 of Lecture Notes in Computer Science, pages 847–856. Springer, 2006.
附录 A OKVS 附录
A.1 OKVS
A.2 不经意 OKVS(Doubly Oblivious Key Value Store, DOKVS)