Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic

被引:7
|
作者
Kondi, Yashvanth [1 ]
Patra, Arpita [2 ]
机构
[1] Int Inst Informat Technol Bangalore, Bangalore, Karnataka, India
[2] Indian Inst Sci, Bangalore, Karnataka, India
来源
关键词
Garbled circuits; Privacy-free; Formula; Information-theoretic; Authenticity; SECURE 2-PARTY COMPUTATION; KNOWLEDGE PROOFS; EFFICIENT; PROTOCOL; SECRET;
D O I
10.1007/978-3-319-63688-7_7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Garbled circuits are of central importance in cryptography, finding widespread application in secure computation, zero-knowledge (ZK) protocols, and verifiable outsourcing of computation to name a few. We are interested in a particular kind of garbling scheme, termed privacy-free in the literature. We show that Boolean formulas can be garbled information-theoretically in the privacy-free setting, producing no ciphertexts at all. Existing garbling schemes either rely on cryptographic assumptions (and thus require cryptographic operations to construct and evaluate garbled circuits), produce garbled circuits of non-zero size, or are restricted to low depth formulaic circuits. Our result has both theoretical and practical implications for garbled circuits as a primitive. On the theory front, our result breaks the known theoretical lower bound of one ciphertext for garbling an AND gate in this setting. As an interesting implication of producing size zero garbled circuits, our scheme scores adaptive security for free. On the practical side, our garbling scheme involves only cheap XOR operations and produces size zero garbled circuits. As a side result, we propose several interesting extensions of our scheme. Namely, we show how to garble threshold and high fan-in gates. An aspect of our garbling scheme that we believe is of theoretical interest is that it does not maintain the invariant that the garbled circuit evaluator must not at any point be in possession of both keys of any wire in the garbled circuit. Our scheme directly finds application in ZK protocols where the verification function of the language is representable by a formulaic circuit. Such examples include Boolean formula satisfiability. The ZK protocols obtained by plugging in our scheme in the known paradigm of building ZK protocols from garbled circuits offer better proof size, while relying on standard assumptions. Furthermore, the adaptivity of our garbling scheme allows us to cast our ZK protocols in the offline-online setting and offload circuit dependent communication and computation to the offline phase. As a result, the online phase enjoys communication and computation (in terms of number of symmetric key operations) complexity that are linearly proportional to the witness size alone.
引用
收藏
页码:188 / 222
页数:35
相关论文
共 50 条
  • [31] An information-theoretic framework for analyzing leak of privacy in distributed hash tables
    Ray, Souvik
    Zhang, Zhao
    P2P: SEVENTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2007, : 27 - 34
  • [32] Information-Theoretic Bounds on the Generalization Error and Privacy Leakage in Federated Learning
    Yagli, Semih
    Dytso, Alex
    Poor, H. Vincent
    PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (IEEE SPAWC2020), 2020,
  • [33] A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach
    Wu, Ningbo
    Peng, Changgen
    Niu, Kun
    IEEE ACCESS, 2020, 8 (08): : 216741 - 216751
  • [34] Size Adaptation of Separable Dictionary Learning with Information-Theoretic Criteria
    Baltoiu, Andra
    Dumitrescu, Bogdan
    2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 7 - 11
  • [35] Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'"
    Kish, Laszlo Bela
    Granqvist, Claes-Goran
    Khatri, Sunil P.
    Peper, Ferdinand
    JOURNAL OF COMPUTATIONAL ELECTRONICS, 2016, 15 (01) : 343 - 346
  • [36] REV: Information-Theoretic Evaluation of Free-Text Rationales
    Chen, Hanjie
    Brahman, Faeze
    Ren, Xiang
    Ji, Yangfeng
    Choi, Yejin
    Swayamdipta, Swabha
    PROCEEDINGS OF THE 61ST ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, VOL 1, 2023, : 2007 - 2030
  • [37] An Information-Theoretic Analysis of the Cost of Decentralization for Learning and Inference under Privacy Constraints
    Jose, Sharu Theresa
    Simeone, Osvaldo
    ENTROPY, 2022, 24 (04)
  • [38] On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving Epidemiological Data Collection
    Cheng, Jiale
    Liu, Nan
    Kang, Wei
    ENTROPY, 2023, 25 (04)
  • [39] BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams
    Mathur, Suhas
    Trappe, Wade
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 752 - 762
  • [40] Information-Theoretic Privacy in Smart Metering Systems Using Cascaded Rechargeable Batteries
    Liu, Yuhan Helena
    Lee, Si-Hyeon
    Khisti, Ashish
    IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (03) : 314 - 318