Abstract
At present, garbled circuits play a vital role in secure multi-party computations. Originating from the garbling scheme of Yao, there is much work on how to hide these types of Boolean gates. At the same time, the universal circuit becomes the primary tool for hiding circuit topologies, which are also part of the private information on circuits. However, this technique is limited to the asymptotically lower bound on the size of the universal circuit where the transformation of the Boolean circuit into a universal circuit leads to an increase in the size of the circuit. In this paper, we propose a new topology-hiding garbling scheme. Our construction has a smaller size of the garbled input than folklore way. Our scheme builds on recent work on updatable laconic oblivious transfer (ULOT) in CRYPTO 2017 and the ULOT scheme is modified to hide the database’s location for receivers. Based on the new scheme, our topology-hiding garbling scheme is proven to provide topology-hiding indistinguishability-based selective security. The topology-hiding garbling scheme also produces a secure two-round private function evaluation scheme for semi-honest adversaries with linear communication costs.
Similar content being viewed by others
Notes
The correctness with regard to writes is the same as in [20], we omit its proof.
The outputs of the whole circuit do not need to hide, thus \(\gamma (\alpha ,\beta ):= f_g(\alpha \oplus r_i, \beta \oplus r_j)\) is for \(g>n+q-m\).
References
Yao, A.: Protocols for secure computation. Proc. of 23rd FOCS, 160–164 (1982)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. Proc. of 19nd STOC, 218-229 (1987)
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols. Proc. of 22nd STOC, 503-513 (1990)
Katz, J., Ostrovsky, R., Smith, A.: Round Efficiency of Multi-party Computation with a Dishonest Majority. EUROCRYPT 2003, LNCS 2656, 578-595 (2003)
Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. CRYPTO 2001, LNCS 2139, 171-189 (2003)
Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits, Proc. of 2012 CCS, 784–796 (2012)
Patra, A., Ravi, D.: On the exact round complexity of secure three-party computation. CRYPTO 2018, LNCS 10992, 425- 458 (2018)
Kamara, S., Mohassel, P., Raykova, M.: Outsourcing multi-party computation. IACR Cryptol. ePrint Arch. 272,(2011)
Wang, Y., Malluhi, Q.M., Khan, K.M.D.: Garbled computation in cloud. Future Gener. Comput. Syst. 62, 54–65 (2016)
Katz, J., Malka, L.: Secure text processing with applications to private DNA matching. Proc. of 17th CCS, 485-492 (2010)
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. Electr. Commer. 99, 129–139 (1999)
Jagadeesh, K.A., Wu, D.J., Birgmeier, J.A., Boneh, D., Bejerano, G.: Deriving genomic diagnoses without revealing patient genomes. Science 357, 692–695 (2017)
Lindell, Y., Pinkas, B.: A proof of security of Yao’s protocol for two-party computation. J. Cryptol. 22(2), 161–188 (2009)
Kolesnikov, V., Schneider, T.: Improved garbled circuit: free XOR gates and applications. ICALP 2008: automata, languages and programming, LNCS 5126, 486–498 (2008)
Zahur, S., Rosulek, M., Evans, D.: Two halves make a whole. EUROCRYPT 2015, LNCS 9057, 220–250 (2015)
Valiant, L.G.: Universal circuits (Preliminary Report). Proc. of 8th STOC, 196-203 (1976)
Kiss, A., Schneider, T.: Valiant’s universal circuit is practical. EUROCRYPT 2016, LNCS 9665, 699–728 (2016)
Kolesnikov, V., Schneider, T.: A practical universal circuit construction and secure evaluation of private functions. Financ. Cryptogr. Data Secur. LNCS 5143, 83–97 (2008)
Paus, A., Sadeghi, A.-R., Schneider, T.: Practical secure evaluation of semi-private functions. 7th Intl. conference on applied cryptography and network security (ACNS), LNCS 5536, 89–106 (2009)
Cho, C., Döttling, N., Garg, S., et al.: Laconic oblivious transfer and its applications, CRYPTO 2017. LNCS 10402, 33–65 (2017)
Schoenmakers, B.: Oblivious transfer. Encycl. Cryptogr. Secur
Abadi, M., Feigenbaum, J.: Secure circuit evaluation. J. Cryptol. 2(1), 1–12 (1990)
Katz, J., Malka, L.: Constant-round private function evaluation with linear complexity. ASIACRYPT 2011. LNCS 7073, 556–571 (2011)
Mohassel, P., Sadeghian, S.: How to hide circuits in MPC an efficient framework for private function evaluation. EUROCRYPT 2013. LNCS 7881, 557–574 (2013)
Wang, Y., Malluhi, Q.m.: Reducing garbled circuit size while preserving circuit gate privacy. https://eprint.iacr.org/2017/041.pdf
Hemenway, B., Jafargholi, Z., Ostrovsky, R., et al.: Adaptively secure garbled circuits from one-way functions, CRYPTO 2016. LNCS 9816, 149–178 (2016)
Garg, S., Srinivasan, A.: A simple construction of iO for turing machines. TCC 2018. LNCS 11240, pp. 425–454 (2018)
Jafargholi, Z., Scafuro, A., Wichs, D.: Adaptively indistinguishable garbled circuits. TCC 2017, LNCS 10678, pp. 40–71 (2017)
Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle tree representation and traversal. CT-RSA 2003, LNCS 2612, 314–326 (2003)
Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. Proc. of 46th STOC, 475-484 (2014)
Acknowledgements
This work is supported by Guangdong Major Project of Basic and Applied Basic Research (2019B030302008) and the National Natural Science Foundation of China (No.61672550, No. 61972429).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, Z., Xie, S. & Zhang, F. Topology-hiding garbled circuits without universal circuits. Int. J. Inf. Secur. 21, 341–356 (2022). https://doi.org/10.1007/s10207-021-00556-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-021-00556-5