Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic

被引:7
|
作者
Kondi, Yashvanth [1 ]
Patra, Arpita [2 ]
机构
[1] Int Inst Informat Technol Bangalore, Bangalore, Karnataka, India
[2] Indian Inst Sci, Bangalore, Karnataka, India
来源
关键词
Garbled circuits; Privacy-free; Formula; Information-theoretic; Authenticity; SECURE 2-PARTY COMPUTATION; KNOWLEDGE PROOFS; EFFICIENT; PROTOCOL; SECRET;
D O I
10.1007/978-3-319-63688-7_7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Garbled circuits are of central importance in cryptography, finding widespread application in secure computation, zero-knowledge (ZK) protocols, and verifiable outsourcing of computation to name a few. We are interested in a particular kind of garbling scheme, termed privacy-free in the literature. We show that Boolean formulas can be garbled information-theoretically in the privacy-free setting, producing no ciphertexts at all. Existing garbling schemes either rely on cryptographic assumptions (and thus require cryptographic operations to construct and evaluate garbled circuits), produce garbled circuits of non-zero size, or are restricted to low depth formulaic circuits. Our result has both theoretical and practical implications for garbled circuits as a primitive. On the theory front, our result breaks the known theoretical lower bound of one ciphertext for garbling an AND gate in this setting. As an interesting implication of producing size zero garbled circuits, our scheme scores adaptive security for free. On the practical side, our garbling scheme involves only cheap XOR operations and produces size zero garbled circuits. As a side result, we propose several interesting extensions of our scheme. Namely, we show how to garble threshold and high fan-in gates. An aspect of our garbling scheme that we believe is of theoretical interest is that it does not maintain the invariant that the garbled circuit evaluator must not at any point be in possession of both keys of any wire in the garbled circuit. Our scheme directly finds application in ZK protocols where the verification function of the language is representable by a formulaic circuit. Such examples include Boolean formula satisfiability. The ZK protocols obtained by plugging in our scheme in the known paradigm of building ZK protocols from garbled circuits offer better proof size, while relying on standard assumptions. Furthermore, the adaptivity of our garbling scheme allows us to cast our ZK protocols in the offline-online setting and offload circuit dependent communication and computation to the offline phase. As a result, the online phase enjoys communication and computation (in terms of number of symmetric key operations) complexity that are linearly proportional to the witness size alone.
引用
收藏
页码:188 / 222
页数:35
相关论文
共 50 条
  • [1] Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge
    Frederiksen, Tore Kasper
    Nielsen, Jesper Buus
    Orlandi, Claudio
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 191 - 219
  • [2] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278
  • [3] Information-Theoretic Privacy Watchdogs
    Hsu, Hsiang
    Asoodeh, Shahab
    Calmon, Flavio P.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 552 - 556
  • [4] Information-Theoretic Approaches to Differential Privacy
    Unsal, Ayse
    Onen, Melek
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [5] Pufferfish Privacy: An Information-Theoretic Study
    Nuradha, Theshani
    Goldfeld, Ziv
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (11) : 7336 - 7356
  • [6] Information-theoretic privacy in federated submodel learning
    Kim, Minchul
    Lee, Jungwoo
    ICT EXPRESS, 2023, 9 (03): : 415 - 419
  • [7] On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
    Diaz, Mario
    Wang, Hao
    Calmon, Flavio P.
    Sankar, Lalitha
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (04) : 1949 - 1978
  • [8] Information-theoretic approaches to privacy in estimation and control
    Nekouei, Ehsan
    Tanaka, Takashi
    Skoglund, Mikael
    Johansson, Karl H.
    ANNUAL REVIEWS IN CONTROL, 2019, 47 : 412 - 422
  • [9] On Properties and Optimization of Information-theoretic Privacy Watchdog
    Sadeghi, Parastoo
    Ding, Ni
    Rakotoarivelo, Thierry
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [10] An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval
    Rebollo-Monedero, David
    Parra-Arnau, Javier
    Forne, Jordi
    SECURITY TECHNOLOGY, 2011, 259 : 146 - 154