116 research outputs found

    Sub-logarithmic Distributed Oblivious RAM with Small Block Size

    Get PDF
    Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM, where the data is stored in m>1m>1 servers. Extensive research over the last few decades have succeeded to reduce the bandwidth overhead of ORAM schemes, both in the single-server and the multi-server setting, from O(N)O(\sqrt{N}) to O(1)O(1). However, all known protocols that achieve a sub-logarithmic overhead either require heavy server-side computation (e.g. homomorphic encryption), or a large block size of at least Ω(log3N)\Omega(\log^3 N). In this paper, we present a family of distributed ORAM constructions that follow the hierarchical approach of Goldreich and Ostrovsky [GO96]. We enhance known techniques, and develop new ones, to take better advantage of the existence of multiple servers. By plugging efficient known hashing schemes in our constructions, we get the following results: 1. For any m2m\geq 2, we show an mm-server ORAM scheme with O(logN/loglogN)O(\log N/\log\log N) overhead, and block size Ω(log2N)\Omega(\log^2 N). This scheme is private even against an (m1)(m-1)-server collusion. 2. A 3-server ORAM construction with O(ω(1)logN/loglogN)O(\omega(1)\log N/\log\log N) overhead and a block size almost logarithmic, i.e. Ω(log1+ϵN)\Omega(\log^{1+\epsilon}N). We also investigate a model where the servers are allowed to perform a linear amount of light local computations, and show that constant overhead is achievable in this model, through a simple four-server ORAM protocol

    PSI from PaXoS: Fast, Malicious Private Set Intersection

    Get PDF
    We present a 2-party private set intersection (PSI) protocol which provides security against malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of Kolesnikov et al. (CCS 2016). Our protocol is based on a new approach for two-party PSI, which can be instantiated to provide security against either malicious or semi-honest adversaries. The protocol is unique in that the only difference between the semi-honest and malicious versions is an instantiation with different parameters for a linear error-correction code. It is also the first PSI protocol which is concretely efficient while having linear communication and security against malicious adversaries, while running in the OT-hybrid model (assuming a non-programmable random oracle). State of the art semi-honest PSI protocols take advantage of cuckoo hashing, but it has proven a challenge to use cuckoo hashing for malicious security. Our protocol is the first to use cuckoo hashing for malicious-secure PSI. We do so via a new data structure, called a probe-and-XOR of strings (PaXoS), which may be of independent interest. This abstraction captures important properties of previous data structures, most notably garbled Bloom filters. While an encoding by a garbled Bloom filter is larger by a factor of O(λ)O(\lambda) than the original data, we describe a significantly improved PaXoS based on cuckoo hashing that achieves constant rate while being no worse in other relevant efficiency measures

    Linear Complexity Private Set Intersection for Secure Two-Party Protocols

    Get PDF
    In this paper, we propose a new private set intersection (PSI) protocol with bi-oblivious data transfer that computes the following functionality. One of the parties P1P_1 inputs a set of items XX and a set of data pairs D1={(d0j,d1j)}D_1 = \{ (d_0^j,d_1^j)\} and the other party P2P_2 inputs a set of items YY. While P1P_1 outputs nothing, P2P_2 outputs a set of data D2={dbjjbj{0,1}}D_2 = \{ d_{b_j}^j \mid b_j \in \{0,1\}\} dependent on the intersection of XX and YY. This functionality is generally required when the PSI protocol is used as a part of a larger secure two-party secure computation such as threshold PSI or any function of the whole intersecting set in general. Pinkas et al. presented a PSI protocol at Eurocrypt 2019 for this type of functionality, which has linear complexity only in communication. While there are PSI protocols with linear computation and communication complexities in the classical PSI setting where the intersection itself is revealed to one party, to the best of our knowledge, there is no PSI protocol, which outputs a function of the membership results and satisfies linear complexity in both communication and computation. We present the first PSI protocol that outputs only a function of the membership results with linear communication and computation complexities. While creating the protocol, as a side contribution, we provide a one-time batch oblivious programmable pseudo-random function based on garbled Bloom filters. We also implemented our protocol and provide performance results

    Venom Proteins of the Parasitoid Wasp Nasonia vitripennis: Recent Discovery of an Untapped Pharmacopee

    Get PDF
    Adult females of Nasonia vitripennis inject a venomous mixture into its host flies prior to oviposition. Recently, the entire genome of this ectoparasitoid wasp was sequenced, enabling the identification of 79 venom proteins. The next challenge will be to unravel their specific functions, but based on homolog studies, some predictions already can be made. Parasitization has an enormous impact on hosts physiology of which five major effects are discussed in this review: the impact on immune responses, induction of developmental arrest, increases in lipid levels, apoptosis and nutrient releases. The value of deciphering this venom is also discussed

    Lectin-Dependent Enhancement of Ebola Virus Infection via Soluble and Transmembrane C-type Lectin Receptors

    Get PDF
    Mannose-binding lectin (MBL) is a key soluble effector of the innate immune system that recognizes pathogen-specific surface glycans. Surprisingly, low-producing MBL genetic variants that may predispose children and immunocompromised individuals to infectious diseases are more common than would be expected in human populations. Since certain immune defense molecules, such as immunoglobulins, can be exploited by invasive pathogens, we hypothesized that MBL might also enhance infections in some circumstances. Consequently, the low and intermediate MBL levels commonly found in human populations might be the result of balancing selection. Using model infection systems with pseudotyped and authentic glycosylated viruses, we demonstrated that MBL indeed enhances infection of Ebola, Hendra, Nipah and West Nile viruses in low complement conditions. Mechanistic studies with Ebola virus (EBOV) glycoprotein pseudotyped lentiviruses confirmed that MBL binds to N-linked glycan epitopes on viral surfaces in a specific manner via the MBL carbohydrate recognition domain, which is necessary for enhanced infection. MBL mediates lipid-raft-dependent macropinocytosis of EBOV via a pathway that appears to require less actin or early endosomal processing compared with the filovirus canonical endocytic pathway. Using a validated RNA interference screen, we identified C1QBP (gC1qR) as a candidate surface receptor that mediates MBL-dependent enhancement of EBOV infection. We also identified dectin-2 (CLEC6A) as a potentially novel candidate attachment factor for EBOV. Our findings support the concept of an innate immune haplotype that represents critical interactions between MBL and complement component C4 genes and that may modify susceptibility or resistance to certain glycosylated pathogens. Therefore, higher levels of native or exogenous MBL could be deleterious in the setting of relative hypocomplementemia which can occur genetically or because of immunodepletion during active infections. Our findings confirm our hypothesis that the pressure of infectious diseases may have contributed in part to evolutionary selection of MBL mutant haplotypes

    Fashioning Entitlements: A Comparative Law and Economic Analysis of the Judicial Role in Environmental Centralization in the U.S. and Europe

    Get PDF
    This paper identifies and evaluates, from an economic point of view, the role of the judiciary the steady shift of environmental regulatory authority to higher, more centralized levels of government in both the U.S. and Europe. We supply both a positive analysis of how the decisions made by judges have affected the incentives of both private and public actors to pollute the natural environment, and normative answers to the question of whether judges have acted so as to create incentives that move levels of pollution in an efficient direction, toward their optimal, cost-minimizing (or net-benefit-maximizing) levels. Highlights of the analysis include the following points: 1) Industrial-era local (state or national) legislation awarding entitlements to pollute was almost certainly inefficient due to a fundamental economic obstacle faced by those who suffer harm from the over-pollution of publicly owned natural resources: the inability to monetize and credibly commit to repay the future economic value of reducing pollution. 2) When industrial era pollution spilled across state lines in the US, the federal courts, in particular the Supreme Court, fashioned a federal common law of interstate nuisance that set up essentially the same sort of blurry, uncertain entitlements to pollute or be free of pollution that had been created by the state courts in resolving local pollution disputes. We argue that for the typical pollution problem, a legal regime of blurry interstate entitlements - with neither jurisdiction having a clear right either to pollute or be free of pollution from the other - is likely to generate efficient incentives for interjursidictional bargaining, even despite the public choice problems besetting majority-rule government. Interestingly, a very similar system of de facto entitlements arose and often stimulated interjursidictional bargaining in Europe as well as in the U.S. 3) The US federal courts have generally interpreted the federal environmental statutes in ways that give clear primacy to federal regulators. Through such judicial interpretation, state and local regulators face a continuing risk of having their decisions overridden by federal regulators. This reduces the incentives for regulatory innovation at the state and local level. Judicial authorization of federal overrides has thus weakened the economic rationale for cooperative federalism suggested by economic models of principal-agent relationships. As a result of the principle of attribution, there is less risk in Europe that (like in the US) courts would enlarge the federal purview and thereby limit the powers of the Member States. Despite this principle, the power of the European bureaucracy (that is, the European Commission) has steadily increased and led to a steady shift of environmental regulatory competencies to the European level. This shift is only sometimes normatively desirable, and yet there is little that the ECJ can or will do to slow it
    corecore