Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic

被引:7
|
作者
Kondi, Yashvanth [1 ]
Patra, Arpita [2 ]
机构
[1] Int Inst Informat Technol Bangalore, Bangalore, Karnataka, India
[2] Indian Inst Sci, Bangalore, Karnataka, India
来源
关键词
Garbled circuits; Privacy-free; Formula; Information-theoretic; Authenticity; SECURE 2-PARTY COMPUTATION; KNOWLEDGE PROOFS; EFFICIENT; PROTOCOL; SECRET;
D O I
10.1007/978-3-319-63688-7_7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Garbled circuits are of central importance in cryptography, finding widespread application in secure computation, zero-knowledge (ZK) protocols, and verifiable outsourcing of computation to name a few. We are interested in a particular kind of garbling scheme, termed privacy-free in the literature. We show that Boolean formulas can be garbled information-theoretically in the privacy-free setting, producing no ciphertexts at all. Existing garbling schemes either rely on cryptographic assumptions (and thus require cryptographic operations to construct and evaluate garbled circuits), produce garbled circuits of non-zero size, or are restricted to low depth formulaic circuits. Our result has both theoretical and practical implications for garbled circuits as a primitive. On the theory front, our result breaks the known theoretical lower bound of one ciphertext for garbling an AND gate in this setting. As an interesting implication of producing size zero garbled circuits, our scheme scores adaptive security for free. On the practical side, our garbling scheme involves only cheap XOR operations and produces size zero garbled circuits. As a side result, we propose several interesting extensions of our scheme. Namely, we show how to garble threshold and high fan-in gates. An aspect of our garbling scheme that we believe is of theoretical interest is that it does not maintain the invariant that the garbled circuit evaluator must not at any point be in possession of both keys of any wire in the garbled circuit. Our scheme directly finds application in ZK protocols where the verification function of the language is representable by a formulaic circuit. Such examples include Boolean formula satisfiability. The ZK protocols obtained by plugging in our scheme in the known paradigm of building ZK protocols from garbled circuits offer better proof size, while relying on standard assumptions. Furthermore, the adaptivity of our garbling scheme allows us to cast our ZK protocols in the offline-online setting and offload circuit dependent communication and computation to the offline phase. As a result, the online phase enjoys communication and computation (in terms of number of symmetric key operations) complexity that are linearly proportional to the witness size alone.
引用
收藏
页码:188 / 222
页数:35
相关论文
共 50 条
  • [21] Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy
    Huang, Chong
    Kairouz, Peter
    Sankar, Lalitha
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 2162 - 2166
  • [22] An overview of information-theoretic security and privacy: Metrics, limits and applications
    Bloch M.
    Günlü O.
    Yener A.
    Oggier F.
    Poor H.V.
    Sankar L.
    Schaefer R.F.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 5 - 22
  • [23] Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery
    Li, Simon
    Khisti, Ashish
    Mahajan, Aditya
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (05) : 3679 - 3695
  • [24] An Information-Theoretic Approach to Time-Series Data Privacy
    Amar, Yousef
    Haddadi, Hamed
    Mortier, Richard
    PROCEEDINGS OF THE WORKSHOP ON PRIVACY BY DESIGN IN DISTRIBUTED SYSTEMS (P2DS'18), 2015,
  • [25] Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees
    Yang, Qing
    Wang, Cheng
    Yuan, Haifeng
    Cui, Jipeng
    Teng, Hu
    Chen, Xue
    Jiang, Changjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3339 - 3352
  • [26] On Information-Theoretic Metrics for Symmetric-Key Encryption and Privacy
    Calmon, Flavio P.
    Varia, Mayank
    Medard, Muriel
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 889 - 894
  • [27] Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach
    Sankar, Lalitha
    Rajagopalan, S. Raj
    Poor, H. Vincent
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 838 - 852
  • [28] Comment on “Zero and negative energy dissipation at information-theoretic erasure”
    Neal G. Anderson
    Journal of Computational Electronics, 2016, 15 : 340 - 342
  • [29] Comment on "Zero and negative energy dissipation at information-theoretic erasure"
    Anderson, Neal G.
    JOURNAL OF COMPUTATIONAL ELECTRONICS, 2016, 15 (01) : 340 - 342
  • [30] Information-theoretic derivation of free quantum field theory(*)
    D'Ariano, Giacomo Mauro
    FOUNDATIONS OF QUANTUM THEORY, 2019, 197 : 203 - 233