Advertisement

Toward Construction of Efficient Privacy Preserving Reusable Garbled Circuits

  • Xu An WangEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 1)

Abstract

In this paper, we propose an efficient way to construct privacy preserving reusable garbled circuits (RGC) with input privacy (IP) and circuit privacy (CP) (which we denote as RGC−IP−CP) based on two-to-one recoding (TOR) scheme. Currently the only way to achieve reusable garbled circuits (RGC) with input privacy (IP) and circuit privacy (CP) heavily rely on FHE, which is Goldwasser et al.’s work. Compared with GKPVZ13, our work can achieve reusable garbled circuits (RGC) with input privacy (IP) and circuit privacy (CP) with high efficiency.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: T. Yu, G. Danezis, V.D. Gligor (eds.) ACMCCS 12, pp. 784–796. ACMPress, Raleigh, NC, USA (2012)Google Scholar
  2. 2.
    Boneh, D., Gentry, C., Gorbunov, S., Halevi, S., Nikolaenko, V., Segev, G., Vaikuntanathan, V., Vinayagamurthy, D.: Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In: P.Q. Nguyen, E. Oswald (eds.) EUROCRYPT 2014, LNCS, vol. 8441, pp. 533–556. Springer, Berlin, Germany, Copenhagen, Denmark (2014). DOI  10.1007/978-3-642-55220-5 30
  3. 3.
    Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: R. Canetti, J.A. Garay (eds.) CRYPTO 2013, Part II, LNCS, vol. 8043, pp. 479–499. Springer, Berlin, Germany, Santa Barbara, CA, USA (2013). DOI  10.1007/978-3-642-40084-1 27
  4. 4.
    Garg, S., Gentry, C., Sahai, A.,Waters, B.:Witness encryption and its applications. In: D. Boneh, T. Roughgarden, J. Feigenbaum (eds.) 45th ACM STOC, pp. 467–476. ACM Press, Palo Alto, CA, USA (2013)Google Scholar
  5. 5.
    Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: Reusable garbled circuits and succinct functional encryption. In: D. Boneh, T. Roughgarden, J. Feigenbaum (eds.) 45th ACM STOC, pp. 555–564. ACM Press, Palo Alto, CA, USA (2013)Google Scholar
  6. 6.
    Gorbunov, S., Vaikuntanathan, V.,Wee, H.: Attribute-based encryption for circuits. In: D. Boneh, T. Roughgarden, J. Feigenbaum (eds.) 45th ACM STOC, pp. 545–554. ACM Press, Palo Alto, CA, USA (2013)Google Scholar
  7. 7.
    Hazay, C., Lindell, Y.: Efficient secure two-party protocols: Techniques and constructions. Springer, ISBN 978-3-642-14303-8 (2010). http://u.cs.biu.ac.il/˜lindell/efficient-protocols.html
  8. 8.
    Lindell, Y.: The yao construction and its proof of security. 1st Bar-Ilan Winter School on Cryptography: Secure Computation and Efficiency (2011). http://u.cs.biu.ac.il/˜lindell/winterschool2011
  9. 9.
    Lindell, Y.: Secure two-party computation in practice. 2nd TCE Summer School on Computer Security (2013). http://events-tce.technion.ac.il/files/2013/07/YehudaLindell2.pdf
  10. 10.
    Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proceedings of the 1st ACM Conference on Electronic Commerce, EC ’99, pp. 129–139. ACM, New York, NY, USA (1999). DOI  10.1145/336992.337028. URL http://doi.acm.org/10.1145/336992.337028
  11. 12.
    Pandey, O., Ramchen, K., Waters, B.: Relaxed two-to-one recoding schemes. In: SCN 14, LNCS, pp. 57–76. Springer, Berlin, Germany (2014). DOI  10.1007/978-3-319-10879-7 4
  12. 13.
    Yao, A.C.C.: Theory and applications of trapdoor functions (extended abstract). In: 23rd FOCS, pp. 80–91. IEEE Computer Society Press, Chicago, Illinois (1982)Google Scholar
  13. 14.
    Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: 27th FOCS, pp. 162–167. IEEE Computer Society Press, Toronto, Ontario, Canada (1986)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Key Laboratory of Cryptology and Information SecurityEngineering University of CAPFXi’anChina

Personalised recommendations